EP2117161A1 - Authentication system - Google Patents

Authentication system Download PDF

Info

Publication number
EP2117161A1
EP2117161A1 EP07860567A EP07860567A EP2117161A1 EP 2117161 A1 EP2117161 A1 EP 2117161A1 EP 07860567 A EP07860567 A EP 07860567A EP 07860567 A EP07860567 A EP 07860567A EP 2117161 A1 EP2117161 A1 EP 2117161A1
Authority
EP
European Patent Office
Prior art keywords
solution
user device
authentication
transmission
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP07860567A
Other languages
German (de)
French (fr)
Inventor
Takatoshi Nakamura
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
N Crypt Lab Inc
Original Assignee
N Crypt Lab Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by N Crypt Lab Inc filed Critical N Crypt Lab Inc
Publication of EP2117161A1 publication Critical patent/EP2117161A1/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present invention relates to an authentication system including a user device and an authentication device which receives, from the user device, a solution that is a pseudorandom number sequentially generated in the user device and judges the validity of the user device by using the received solution.
  • authentication is performed as follows: solution generating means for sequentially generating a solution that is a pseudorandom number is stored in advance in each of the authentication device and the user device; when the authentication device is accessed by the user device, the authentication device receives a solution generated in the user device and collates the received solution with a solution generated by the solution generating means of the authentication device to judge whether the solutions match; then, when the solutions match, it is judged that the user device is valid.
  • the solution generating means of the user device is the same as the solution generating means of the authentication device, and those two solution generating means sequentially generate the same solutions in the same order.
  • Objects of the present invention are to reduce a possibility of such an unauthorized access to be made after authentication and to improve the level of communication security.
  • the inventor of this application proposes the following authentication system.
  • An authentication system includes: a user device; and an authentication device for judging whether the user device is valid.
  • the user device includes: solution generating means for sequentially generating a solution that is a pseudorandom number; solution transmission means for sending the solution generated by the solution generating means to the authentication device; and transmission and reception means for performing transmission and reception of transmission-object data with the authentication device when the authentication device judges that the user device is valid.
  • the authentication device includes: solution generating means for sequentially generating a solution identical to the solution generated in the user device, in the same order as in the user device; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, and the judgement means performs the judgement multiple times by using solutions sequentially generated, while transmission and reception of the transmission-object data are being performed with the user device.
  • the judgement is performed multiple times by using solutions sequentially generated, while transmission and reception of the transmission-obj ect data are being performed with the user device.
  • the validity of the user device is judged many times by performing the judgement multiple times while transmission and reception of the transmission-object data are being performed.
  • the validity of the user device is judged by using solutions sequentially generated anew, in other words, by using a different solution each time, so the level of communication security can be further improved.
  • an authentication system includes: at least two user devices; and an authentication device for judging whether each of the user devices is valid.
  • Each of the user devices includes: a first user solution generating means and a second user solution generating means each for sequentially generating a solution that is a pseudorandom number; solution transmission means for sending the solution generated by the first user solution generating means or the second user solution generating means to the authentication device; and transmission and reception means for performing transmission and reception of transmission-object data with the authentication device when the authentication device judges that the user device is valid, the first user solution generating means is unique to each of the user devices, and the second user solution generating means is common to predetermined user devices(some of user devices).
  • the authentication device includes: a number of first authentication solution generating means, the number being the same as that of the user devices, each for sequentially generating a solution identical to the solution generated by the first user solution generating means of a corresponding user device, in the same order as in the first user solution generating means; a second authentication solution generating means for sequentially generating a solution identical to the solution generated by the second user solution generating means of the user device, in the same order as in the second user solution generating means; a first judgement means for judging whether a user device is valid by using a solution generated by the first user solution generating means of the user device and received from the user device and the solution generated by the first authentication solution generating means corresponding to the user device; a second judgement means for judging whether a user device is valid by using a solution generated by the second user solution generating means of the user device and received from the user device and the solution generated by the second authentication solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the first judgement
  • the same data can be accessed by multiple user devices which have the same second user solution generating means.
  • an authentication device receives a solution that is a pseudorandom number sequentially generated in a user device from the user device and judges whether the user device is valid by using the received solution.
  • This authentication device includes: solution generating means for sequentially generating a solution identical to the solution generated in the user device, in the same order as in the user device; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, in which the judgement means performs the judgement multiple times by using solutions sequentially generated, while transmission and reception of the transmission-object data are being performed with the user device.
  • the judgement is performed multiple times by using solutions sequentially generated, while transmission and reception of the transmission-object data are being performed with the user device.
  • the validity of the user device is judged multiple times while transmission and reception of the transmission-object data are being performed.
  • the judgement means may perform the judgement at any timing as long as the judgement is performed multiple times by using solutions sequentially generated, while transmission and reception of the transmission-object data are being performed with the user device. For example, during the transmission and reception of the transmission-object data performed with the user device, the judgement means may perform the judgement at intervals of a predetermined period of time or every time the amount of data sent and received by the transmission and reception means reaches a predetermined amount of data. Note that the predetermined period of time (the predetermined amount of data) may or may not be a fixed period of time (a fixed amount of data).
  • a solution generated in the user device may be sent to the authentication device as it is or may be encrypted before being sent to the authentication device.
  • the solution generated in the user device may be sent to the authentication device as it is (without being encrypted).
  • the solution generated in the user device may be encrypted by using a predetermined algorithm and a predetermined key and then sent to the authentication device
  • the authentication device may further include solution encrypting means for encrypting the solution generated by the solution generating means, by using the predetermined algorithm and the predetermined key
  • the judgement means may collate the encrypted solution received from the user device with the solution encrypted by the solution encrypting means, and judge, when the solutions match, that the user device is valid.
  • the solution generated in the user device may be encrypted by using a predetermined algorithm and a predetermined key and then sent to the authentication device
  • the authentication device may further include solution decrypting means for decrypting the encrypted solution received from the user device, by using the predetermined algorithm and the predetermined key used when the solution was encrypted in the user device
  • the judgement means may collate the solution decrypted by the solution decrypting means with the solution generated by the solution generating means, and judge, when the solutions match, that the user device is valid.
  • the predetermined algorithm or the predetermined key may be a fixed algorithm or key which is not changed. At least one of the predetermined algorithm and the predetermined key may be sequentially generated anew at a predetermined timing by using solutions sequentially generated in the user device and the authentication device.
  • the user device may divide original plaintext data into multiple plaintext division data items in units of a predetermined number of bits, encrypts the multiple plaintext division data items by using a predetermined algorithm and a predetermined key to generate encrypted division data items, and send the encrypted division data items to the authentication device as the transmission-object data
  • the authentication device may further include: decryption means for decrypting the encrypted division data items by using the predetermined algorithm and predetermined key used when the multiple plaintext division data items are encrypted, to generate plaintext division data items; and connection means for connecting the plaintext division data items decrypted by the decryption means to generate decrypted data.
  • the authentication device may hold data identical to the transmission-object data held by the user device, and the judgement means may collate the decrypted data decrypted by the decryption means with the data identical to the transmission-object data, and judge, when those pieces of data match, that the user device is valid.
  • the authentication device may hold data identical to the transmission-object data held by the user device, the authentication device may further include: division means for dividing the data identical to the transmission-object data into units of a predetermined number of bits to generate division data items; and encryption means for encrypting the division data items by using the predetermined algorithm and the predetermined key, and the judgement means may collate the encrypted division data items received from the user device with the division data items encrypted by the encryption means, and judge, when those pieces of data match, that the user device is valid.
  • the authentication device When the authentication device has data identical to the transmission-object data held by the user device, the data can be used to judge the validity of the user device.
  • Means for establishing two data paths between the authentication device and the user device may be provided, one of the two data paths being used to perform transmission and reception of the solution to be used to judge the validity of the user device, and the other one of the two data paths being used to perform transmission and reception of the transmission-object data.
  • the transmission-object data and the solution are sent and received in parallel, and the transmission-object data and the solution are sent and received alternately in a time-division manner.
  • the transmission-object data and the solution are sent and received alternately in a time-division manner when a packet which contains solution data is sent at predetermined intervals between transmission events of packets which contain transmission-object data.
  • means for establishing one data path between the authentication device and the user device may be provided, the one data path being used to perform transmission and reception of the solution to be used to judge the validity of the user device, and being also used to perform transmission and reception of the transmission-object data.
  • the one data path is used when the solution data is contained in the header of each of packets which contain the transmission-object data and is sent.
  • a data path used to receive, from the user device, a solution for judging the validity of the user device and a data path used to send and receive transmission-object data may be identical to each other or may be separated from each other.
  • At least one of the predetermined algorithm and the predetermined key may be sequentially generated anew at a predetermined timing by using the solutions sequentially generated in the user device and the authentication device.
  • An authentication device is used in combination with at least two user devices to judge whether each of the user devices is valid, each of the user devices including: a first user solution generating means and a second user solution generating means each for sequentially generating a solution that is a pseudorandom number; solution transmission means for sending the solution generated by the first user solution generating means or the second user solution generating means to the authentication device; and transmission and reception means for performing transmission and reception of transmission-object data with the authentication device when the authentication device judges that the user device is valid, the first user solution generating means being unique to each of the user devices, and the second user solution generating means being common to predetermined user devices.
  • the authentication device includes: a number of first authentication solution generating means, the number being the same as that of the user devices, each for sequentially generating a solution identical to the solution generated by the first user solution generating means of a corresponding user device, in the same order as in the first user solution generating means; a second authentication solution generating means for sequentially generating a solution identical to the solution generated by the second user solution generating means of the user device, in the same order as in the second user solution generating means; a first judgement means for judging whether a user device is valid by using a solution generated by the first user solution generating means of the user device and received from the user device and the solution generated by the first authentication solution generating means corresponding to the user device; a second judgement means for judging whether a user device is valid by using a solution generated by the second user solution generating means of the user device and received from the user device and the solution generated by the second authentication solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the first judgement means
  • the same data can be accessed by multiple user devices which have the same second user solution generating means, as described above.
  • the same operation and effect as provided by the authentication device including the judgement means can be obtained by the following method, for example.
  • An authentication method is executed in an authentication device which includes: reception means for receiving a solution that is a pseudorandom number sequentially generated in a user device from the user device; and judgement means for judging whether the user device is valid by using the received solution.
  • the authentication method includes the steps performed by the authentication device of: sequentially generating a solution identical to the solution generated in the user device, in the same order as in the user device; judging whether a user device is valid by using a solution received from the user device and the generated solution; and performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, and the judgement is performed multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device.
  • This application also provides an authentication method executed in an authentication device which includes: reception means for receiving, from a user device, a solution that is a pseudorandom number sequentially generated by solution generating means unique to the user device or a solution that is a pseudorandom number sequentially generated by solution generating means common to predetermined user devices; and judgement means for judging whether the user device is valid by using the received solution.
  • the authentication method includes the steps performed by the authentication device of: sequentially generating a solution identical to the solution generated by the solution generating means unique to the user device, in the same order as in the solution generating means unique to the user device, when the solution generated by the solution generating means unique to the user device is received from the user device; sequentially generating a solution identical to the solution generated by the solution generating means common to the predetermined user devices, in the same order as in the solution generating means common to the predetermined user devices, when the solution generated by the solution generating means common to the predetermined user devices is received from the user device; judging whether a user device is valid by using a solution received from the user device and the solution generated in the authentication device; and performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, and the judgement is performed multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device.
  • a user device is used in combination with an authentication device, the authentication device receiving a solution that is a pseudorandom number sequentially generated in the user device from the user device, judging whether the user device is valid by using the received solution, and including: solution generating means for sequentially generating a solution that is a pseudorandom number; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, the judgement means performing the judgement multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device.
  • the user device includes: solution generating means for sequentially generating a solution identical to the solution generated in the authentication device, in the same order as in the authentication device; solution transmission means for sending the solution generated by the solution generating means to the authentication device; and transmission and reception means for performing the transmission and reception of the transmission-object data with the authentication device when the authentication device judges that the user device is valid.
  • thejudgementcan be performed multipletimes by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device, as described above.
  • the user device may further include solution encrypting means for encrypting the solution generated by the solution generating means by using a predetermined algorithm and a predetermined key, and may send the solution encrypted by the solution encrypting means to the authentication device.
  • another user device is used in combination with an authentication device, the authentication device receiving a solution that is a pseudorandom number sequentially generated in the user device from the user device, judging whether the user device is valid by using the received solution, and including: a first authentication solution generating means and a second authentication solution generating means each for sequentially generating a solution that is a pseudorandom number; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the first authentication solution generating means or the second authentication solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, the same number of the first authentication solution generating means being provided as that of the user device and each being unique to the corresponding user device, the second authentication solution generating means being common to predetermined user devices, the judgement means performing the judgement multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device.
  • the user device includes: a first user solution generating means unique to each of the user devices, for sequentially generating a solution identical to the solution generated by the corresponding first authentication solution generating means of the authentication device, in the same order as in the first authentication solution generating means; a second user solution generating means common to predetermined user devices, for sequentially generating a solution identical to the solution generated by the second authentication solution generating means of the authentication device, in the same order as in the second authentication solution generating means; solution transmission means for sending the solution generated by the first user solution generating means or the second user solution generating means to the authentication device; and transmission and reception means for performing the transmission and reception of the transmission-object data with the authentication device when the authentication device judges that the user device is valid.
  • the same data can be accessed by multiple user devices which have the same second user solution generating means, as described above.
  • a data processing method is executed in a user device used in combination with an authentication device, the authentication device receiving a solution that is a pseudorandom number sequentially generated in the user device from the user device, judging whether the user device is valid by using the received solution, and including: solution generating means for sequentially generating a solution that is a pseudorandom number; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, the judgement means performing the judgement multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device.
  • the data processing method includes the steps performed by the user device of: sequentially generating a solution identical to the solution generated in the authentication device, in the same order as in the authentication device; sending the generated solution to the authentication device; and performing the transmission and reception of the transmission-object data with the authentication device when the authentication device judges that the user device is valid.
  • another data processing method is executed in a user device used in combination with an authentication device, the authentication device receiving a solution that is a pseudorandom number sequentially generated in the user device from the user device, judging whether the user device is valid by using the received solution, and including: a first authentication solution generating means and a second authentication solution generating means each for sequentially generating a solution that is a pseudorandom number; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the first authentication solution generating means or the second authentication solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, the same number of the first authentication solution generating means being provided as that of the user device and each being unique to the corresponding user device, the second authentication solution generating means being common to predetermined user devices, the judgement means performing the judgement multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user
  • the data processing method includes the steps performed by the user device of: sequentially generating a solution identical to the solution generated by the first authentication solution generating means or the second authentication solution generating means of the authentication device, in the same order as in the first authentication solution generating means or the second authentication solution generating means of the authentication device; sending the generated solution to the authentication device; and performing the transmission and reception of the transmission-object data with the authentication device when the authentication device judges that the user device is valid.
  • the present invention it is possible to reduce a possibility of an unauthorized access to be made after the user device is authenticated and to improve the level of communication security.
  • An authentication system 1 is configured as schematically shown in FIG. 1 .
  • the authentication system 1 includes an authentication device 11 and user devices 12 connected to the authentication device 11 via a network 13.
  • the network 13, which connects the authentication device 11 to each of the user devices 12, is the Internet, for example.
  • the network 13 may be configured by another means such as an intranet or a dedicated line, instead of the Internet.
  • FIG. 2 shows a hardware configuration of the authentication device 11.
  • the authentication device 11 includes a central processing unit (CPU) 21, a read only memory (ROM) 22, a hard disk drive (HDD) 23, a random access memory (RAM) 24, an input device 25, a display device 26, encryption devices 27, a communication device 28, a judgement device 29, and a bus 30.
  • the CPU 21, the ROM 22, the HDD 23, the RAM 24, the input device 25, the display device 26, the encryption devices 27, the communication device 28, and the judgement device 29 can exchange data with each other via the bus 30.
  • a predetermined program and predetermined data are recorded (the predetermined data sometimes includes transmission-object data.
  • the predetermined data includes transmission-object data.
  • the predetermined data also includes data necessary to execute the predetermined program).
  • the CPU 21 controls the entire authentication device 11, and performs processing described later based on the program and the data stored in the ROM 22 or the HDD 23.
  • the RAM 24 is used as a working storage area when the CPU 21 performs the processing.
  • the input device 25 is configured by a keyboard, a mouse, and the like, and is used to input a command and data.
  • the display device 26 is configured by a liquid crystal display (LCD), a cathode ray tube (CRT), or the like, and is used to display a command, inputted data, the status of processing described later, and the like.
  • the encryption device 27 decrypts encrypted data that is encrypted transmission-object data received from the user device 12 and encrypts transmission-object data held by the authentication device 11.
  • the communication device 28 performs communications with the user device 12 via the network 13.
  • a communication device 38 of the user device 12 performs communications with the authentication device 11 via the network 13.
  • the judgement device 29 collates a solution received from the user device 12 via the network 13 with a solution generated by the encryption device 27 to judge whether those solutions match.
  • FIG. 3 is a block configuration diagram of the communication device 28.
  • the communication device 28 includes an interface section 281 and a communication section 282.
  • the interface section 281 exchanges data between the bus 30 and the communication device 28.
  • the interface section 281 receives, from the communication section 282, an access request signal, solution data, or encrypted data, which has been sent from the user device 12, and sends the received access request signal, solution data, or encrypted data to the bus 3 0. Further, the interface section 281 receives, from the bus 30, a solution request signal described later or encrypted data, which is destined for the user device 12, and sends the received solution request signal or encrypted data to the communication section 282.
  • FIG. 4 is a block configuration diagram of the encryption device 27.
  • the encryption device 27 includes an interface section 271, a pre-processing section 272, an encryption and decryption section 273, a solution generating section 274, and a connection section 275.
  • the interface section 271 exchanges data between the bus 30 and the communication device 28.
  • the interface section 271 receives, from the communication device 28 via the bus 30, the solution request signal to be sent to the user device 12 or encrypted division data items (the encrypted division data items are obtained when plaintext transmission-obj ect data is divided in units of a predetermined number of bits to generate multiple plaintext division data items and the plaintext division data items are encrypted), also receives transmission-object data from the HDD 23 via the bus 30, and sends the received encrypted division data items or transmission-object data to the pre-processing section 272.
  • the interface section 271 sends data indicating that the solution data has been received, to the solution generating section 274.
  • the interface section 271 receives decrypted transmission-object data from the connection section 275 and encrypted data from the encryption and decryption section 273, and sends those pieces of data to the bus 30.
  • the pre-processing section 272 has a function of dividing the transmission-object data received from the bus 30 via the interface section 271, in units of the predetermined number of bits to generate plaintext division data items and sending the plaintext division data items to the encryption and decryption section 273. How to divide the transmission-object data will be described later.
  • the encryption and decryption section 273 has a function of receiving theplaintext division data items or the encrypted division data items from the pre-processing section 272; encrypting, when the plaintext division data items are received, the plaintext division data items; and decrypting, when the encrypted division data items are received, the encrypted division data items.
  • the reference number of bits serving as a unit of processing used when processings of encryption and decryption are performed, is fixed.
  • the reference number of bits used in this embodiment is 8 bits, but it is not limited to 8 bits. Details of the processings of encryption and decryption will be described.
  • the description is given on the assumption that the processings of encryption and decryption are performed by using a given algorithm and a given key which are unique to each user device 12.
  • at least one of the algorithm and the key, to be used for encryption and decryption may be sequentially generated anew at predetermined timing by using solutions sequentially generated in the user device 12 and the authentication device 11.
  • the processings of encryption and decryption may be performed by using a given algorithm and a given key which are common to multiple predetermined user devices.
  • at least one of the algorithm and the key may be sequentially generated anew by using solutions sequentially generated in the multiple predetermined user devices and the authentication device 11.
  • the solution generating section 274 sequentially generates a solution when the data indicating that the solution request signal has been received is received from the interface section 271.
  • the solutions generated by the solution generating section 274 of the authentication device 11 are identical to the solutions generated by a solution generating section 374 described later of the user device 12 in the same order as in the solution generating section 274.
  • the solution used in this embodiment is a pseudorandom number.
  • the generated solution is sent to the interface section 271 and further sent to the judgement device 29 via the bus 30.
  • connection section 275 has a function of connecting plaintext division data items generated by decrypting encrypted division data items in the encryption and decryption section 273 in the original order to obtain one piece of transmission-object data.
  • the transmission-object data is sent to the interface section 271 and further sent, via the bus 30, to the HDD 23 or the CPU 21 as needed.
  • the connection section 275 also has a function of connecting encrypted division data items generated by encrypting plaintext division data items in the encryption and decryption section 273 to obtain one piece of encrypted data.
  • the encrypted data is sent to the interface section 271, further sent from the interface section 271 to the communication section 282 of the communication device 28 via the bus 30, and further sent from the communication section 282 to the user device 12.
  • the connection section 275 may not have the function of connecting encrypted division data items generated by encrypting plaintext division data items in the encryption and decryption section 273.
  • the encrypted division data items are sequentially sent in the order of encryption to the communication device of the user device 12 serving as a transmission destination.
  • the connection section 275 does not have the function of connecting the encrypted division data items, the encrypted division data items can be directly sent to the communication section 282 without passing through the connection section 275.
  • each encryption device 27 has the same configuration as the encryption device of each of the registered user devices 12.
  • FIG. 5 is a block configuration diagram of the judgement device 29.
  • the judgement device 29 includes an interface section 291, a judgement section 292, and an ID data recording section 293.
  • the interface section 291 receives, from the communication device 28 via the bus 30, ID data added to an access request signal or solution data which has been sent from the user device 12, or receives solution data generated by the encryption device 27 via the bus 30, and sends the received ID data or solution data to the judgement section 292.
  • the interface section 291 also receives judgement data indicating that the user device 12 is valid from the judgement section 292.
  • the judgement data is sent to the HDD 23 or the like via the bus 30 and transmission and reception of data are started between the user device 12 and the authentication device 11.
  • the interface section 291 also receives a solution request signal described later from the judgement section 292, and sends the solution request signal to the communication device 28 via the bus 30.
  • ID data recording section 293 multiple pieces of ID data indicating multiple user devices registered in the authentication device 11 are recorded.
  • the judgement section 292 judges whether ID data sent from the user device 12 has been recorded in the ID data recording section 293. When the ID data has been recorded, the judgement section 292 generates a solution request signal for requesting the user device 12 to send solution data.
  • the solution request signal is sent from the interface section 291 to the communication device 28 via the bus 30 and further sent to the user device 12.
  • the solution data sent from the user device 12 is collated with solution data generated by the encryption device 27. When those pieces of solution data match, the user device 12 is judged as valid.
  • the judgement section 292 has a timer (not shown). Every time a predetermined period of time elapses after the user device 12 is judged as valid, the judgement section 292 generates a solution request signal to request the user device 12 to send new solution data.
  • the authentication device 11 sends a solution request signal to the user device 12, and, in response to this, the user device 12 sends solution data to the authentication device 11.
  • the solution-data generation and transmissionmechanism is not limited to this.
  • the configuration may be made such that the timing of generation of the solution data after access authentication is judged in advance between the authentication device 11 and the user device 12 and the solution data generated in the user device 12 is sent to the authentication device 11.
  • FIG. 6 shows a hardware configuration of the user device 12.
  • the hardware configuration of the user device 12 is basically the same as that of the authentication device 11. However, the user device 12 is different from the authentication device 11 in that the user device 12 does not include the judgement device 29 included in the authentication device 11.
  • a CPU 31, a ROM 32, an HDD 33, a RAM 34, an input device 35, a display device 36, the communication device 38, and a bus 39 are identical to the CPU 21, the ROM 22, the HDD 23, the RAM 24, the input device 25, the display device 26, the communication device 28, and the bus 30 in the authentication device 11, respectively.
  • predetermined data recorded in the ROM 32 or the HDD 33 includes ID data unique to the user device 12 and transmission-object data.
  • An encryption device 37 has a function of encrypting transmission-object data and decrypting encrypted data as in the encryption device 27 of the authentication device 11.
  • FIG. 7 is a block configuration diagram of the encryption device 37.
  • the encryption device 37 includes an interface section 371, a pre-processing section 372, an encryption and decryption section 373, a solution generating section 374, and a connection section 375.
  • the interface section 371 exchanges data between the bus 39 and the encryption device 37.
  • the interface section 371 receives, from the communication device 38 via the bus 39, a solution request signal or encrypted division data items, sent from the authentication device 11, also receives transmission-object data from the HDD 33 via the bus 39, and sends the received encrypted division data items or transmission-object data to the pre-processing section 372.
  • the interface section 371 sends data indicating that the solution request signal has been received to the solution generating section 374.
  • the interface section 371 receives decrypted transmission-object data from the connection section 375 and encrypted data from the encryption and decryption section 373, and sends those pieces of data to the bus 39.
  • the pre-processing section 372 has a function of dividing the transmission-object data received from the bus 39 via the interface section 371, in units of a predetermined number of bits to generate plaintext division data items and sending the plaintext division data items to the encryption and decryption section 373.
  • the encryption and decryption section 373 has a function of receiving theplaintext division data items or the encrypted division data items from the pre-processing section 372; encrypting, when the plaintext division data items are received, the plaintext division data items; and decrypting, when the encrypted division data items are received, the encrypted division data items.
  • the reference number of bits serving as a unit of processing used when processings of encryption and decryption are performed, is fixed.
  • the reference number of bits used in this embodiment is 8 bits, but it is not limited to 8 bits.
  • the description is given on the assumption that the processings of encryption and decryption are performed by using a given algorithm and a given key as in the authentication device 11.
  • the solution generating section 374 sequentially generates a solution when the data indicating that the solution request signal has been received is received from the interface section 371.
  • the generated solution is sent to the interface section 371 and further sent to the communication device 38 via the bus 39.
  • connection section 375 of the user device 12 Functions of the connection section 375 of the user device 12 is the same as those of the connection section 275 of the authentication device 11.
  • the connection section 375 connects plaintext division data items generated by decrypting encrypted division data items in the encryption and decryption section 373, to generate one piece of transmission-object data.
  • the transmission-object data is sent to the HDD 33 or the like via the bus 39.
  • the connection section 375 also has a function of connecting encrypted division data items generated by encrypting plaintext division data items in the encryption and decryption section 373, to obtain one piece of encrypted data.
  • the encrypted data is sent to the interface section 371, further sent from the interface section 371 to the communication section 383 of the communication device 38 via the bus 39, and further sent from the communication section 383 to the authentication device 11 via the network 13.
  • the connection section 375 may not have the function of connecting encrypted division data items generated by encrypting plaintext division data items in the encryption and decryption section 373.
  • FIG. 8 is a diagram showing a block configuration of the communication device 38.
  • the communication device 38 includes an interface section 381, an ID data adding section 382, and the communication section 383.
  • the interface section 381 exchanges data between the bus 39 and the communication device 38.
  • the interface section 381 receives, from the communication section 383, a solution request signal or encrypted data, which has been sent from the authentication device 11, and sends the received solution request signal or encrypted data to the bus 39. Further, the interface section 381 receives, from the bus 39, an access request signal described later, solution data, or encrypted data, which is destined for the authentication device 11, and sends the received access request signal, solution data, or encrypted data to the ID data adding section 382.
  • the ID data adding section 382 adds ID data to, for example, the header of the access request signal or the like to be sent.
  • the ID data identifies the user device 12 which sends the encrypted data or the like.
  • the ID data uniquely specifies each user device 12, and is recorded in the ROM 32 or the HDD 33.
  • the ID data adding section 382 reads ID data from the ROM 32 or the HDD 33 and adds the ID data to the encrypted data or the like.
  • the authentication device 11 can understand, from the ID data added to the received encrypted data or the like, the user device 12 which has sent the encrypted data or the like.
  • the ID data adding section 382 sends the encrypted data or the like, to which the ID data has been added, to the communication section 383.
  • the communication section 383 receives the encrypted data or the like and sends it to the authentication device 11.
  • the authentication device 11 judges whether the user device 12 which has accessed the authentication device 11 is valid (S110).
  • the authentication device 11 judges whether the user device 12 which has accessed the authentication device 11 is valid (S140).
  • the description is given, in this embodiment, on the assumption that the case where the validity of the user device 12 needs to be judged for the second time or more is the case where a predetermined period of time has elapsed after the access to the authentication device 11 is authenticated.
  • the necessity of the validity check is not limited to this case. It may be necessary to judge the validity of the user device 12 for the second time or more when the amount of data sent and received between the authentication device 11 and the user device 12 reaches a predetermined amount of data.
  • a predetermined period of time (a predetermined amount of data) may or may not be a fixed period of time (a fixed amount of data).
  • the user device 12 sends an access request signal to which ID data has been added, to the authentication device 11.
  • the CPU 31 when a command to access the authentication device 11 is inputted from the input device 35, the CPU 31 generates the access request signal, reads the ID data of the user device 12 from the ROM 32 or the HDD 33, and temporarily records the ID data in the RAM 34, for example.
  • the ID data is sent from the ROM 32 or the HDD 33 to the communication device 38 via the bus 39 while the access request signal is also sent to the communication device 38.
  • the ID data is added to the access request signal in the ID data adding section 382.
  • the access request signal, to which the ID data has been added, is sent from the communication section 383 to the communication device 28 of the authentication device 11 via the network 13.
  • the authentication device 11 When the authentication device 11 is accessed by the user device 12 (S1101), the authentication device 11 judges whether the ID data sent from the user device 12 has been registered (S1102).
  • the communication device 28 receives the access request signal, to which the ID data has been added, from the user device 12, the ID data which has been added to the access request signal is sent from the interface section 281 of the communication device 28 to the judgement section 292 of the judgement device 29 via the bus 30.
  • the judgement section 292 judges whether ID data that matches the received ID data is included in the ID data recording section 293.
  • the authentication device 11 When the ID data sent from the user device 12 has been registered in the authentication device 11 (when ID data that matches the received ID data is included) (Yes in S1102), the authentication device 11 sends a solution request signal to the user device 12 (S1103).
  • the judgement section 292 of the judgement device 29 generates the solution request signal for requesting the user device 12 to send solution data.
  • the solution request signal is sent from the interface section 291 to the communication device 28 via the bus 30.
  • the solution request signal is further sent from the communication device 28 to the user device 12.
  • solution request signal generated by the judgement section 292 of the judgement device 29 is also sent to the encryption device 27 corresponding to the user device 12 included in the authentication device 11, and the encryption device 27 generates solution data (S1104).
  • the user device 12 When the solution request signal is received, the user device 12 generates solution data to be sent to the authentication device 11.
  • the solution request signal is received by the communication device 38 and sent to the interface section 371 of the encryption device 37 via the bus 39.
  • the interface section 371 of the encryption device 37 sends data indicating that the solution request signal has been received, to the solution generating section 374.
  • the solution generating section 374 receives the data.
  • the interface section 271 of the encryption device 27 of the authentication device 11 sends data indicating that the solution request signal has been received, to the solution generating section 274.
  • the solution generating section 274 receives the data.
  • the solution generating section 374 or the solution generating section 274 starts generating a solution.
  • the solution generated in this embodiment is a matrix (X) of 8 rows by 8 columns, but the form of the solution is not limited to this.
  • the solution generating section 374 continuously generates a solution in a nonlinear transition manner, but the characteristic of the solution is not necessarily required. As a result of the nonlinear transition, the solution is a pseudorandom number.
  • the solution generation process includes calculation of a power of a past solution
  • the solution generation process includes multiplication of two or more past solutions
  • a combination of (1) and (2) are conceivable: (1) the solution generation process includes calculation of a power of a past solution; (2) the solution generation process includes multiplication of two or more past solutions; and a combination of (1) and (2).
  • the solution generating section 374 has a 01 solution (X 01 ) and a 02 solution (X 02 ) as predetermined initial matrices (for example, the 01 solution and the 02 solution are recorded in a predetermined memory such as the HDD 33 or the ROM 32).
  • Each user devices 12 has different initial matrices, and therefore, each user device 12 generates a different solution.
  • the solution generating section 274 of the encryption device 27 in the authentication device 11 records the same initial matrices as each user device 12 in association with the ID data in a predetermined memory such as the HDD 23 or the ROM 22.
  • the solution generating section 374 substitutes the initial matrices into a solution generation algorithm to generate a first solution (X 1 ) as follows.
  • the first solution (X 1 ) X 02 X 01 + ⁇ (in this embodiment, " ⁇ " is a matrix of 8 rows by 8 columns)
  • the solution generating section 374 When the interface section 371 receives the next solution request signal from the bus 39, the solution generating section 374 generates a second solution (X 2 ) as follows.
  • the solution generating section 374 generates a third solution, a fourth solution, ... an N-th solution, as follows.
  • the solution generated as described above is sent to the interface section 371 and is also held in the solution generating section 374.
  • the solution generating section 374 needs to hold the two solutions generated immediately before (or a section other than the solution generating section 374 needs to hold the two solutions).
  • solutions that are older than the two solutions generated immediately before are not used any more to generate a new solution.
  • the solution generating section 374 always holds the two solutions generated immediately before.
  • the solutions generated as described above are chaotic solutions which are generated in the nonlinear transition manner, that is, pseudorandom numbers.
  • the above-mentioned " ⁇ " can be environmental information.
  • the 01 solution (X 01 ) and the 02 solution (X 02 ), serving as the initial matrices held by the solution generating section 374 of each user device 12 and the solution generating section 274 of the authentication device 11 corresponding to the user device 12 can be environmental information.
  • the environmental information unique to the user device 12 may be used to generate matrices (including the initial matrices) or may be used as the initial matrices.
  • serving as environmental information is not necessarily used every time a solution is generated.
  • the environmental information unique to each user device 12 can be information of a peripheral device connected to the user device 12, for example.
  • the information of a peripheral device include: the address information or the MAC address information of a router allocated to each user device 12; information on the type or the serial number of a printer connected to each user device 12; information of a server connected to each user device 12; and information of a mouse connected to each user device 12.
  • the environmental information unique to each user device 12 can also be information used in the user device 12.
  • examples of the information used in the user device 12 include: folder name information of a folder storing particular data such as transmission-object data or folder name information of a predetermined folder included in each user device 12; file name information of a predetermined file; and address information, hierarchical information, and byte-count information of the folder or file.
  • Predetermined calculation or predetermined conversion is applied to such environmental information to convert the environmental information into a number falling in a range where the number can be used as " ⁇ ", the 01 solution (X 01 ), or the 02 solution (X 02 ) to use the obtained number.
  • " ⁇ " is obtained, for example, when the code of the characters composing a file name is expressed in binary "1s” and "0s", by sequentially arranging a data string expressed by "1s” and "0s” as elements in a matrix of 8 rows by 8 columns.
  • the number of the data items included in the data string obtained when the file name is expressed in binary "1s” and "0s" is smaller than the number of the elements in a matrix of 8 rows by 8 columns, that is, 64, the data string is used repeatedly.
  • how the environmental information is used may be judged appropriately.
  • the solution generating section 374 has one initial matrix when (a) expression is used, two initial matrices when (c) expression is used, and four initial matrices when (b) expression is used.
  • Environmental information unique to each user device 12 is hardly obtained by devices other than the user device 12 and the authentication device 11 in which the environmental information has been registered.
  • the environmental information unique to each user device 12 cannot be obtained from the outside.
  • the environmental information unique to each user device 12 is stored in advance in the solution generating section 274 of the encryption device 27 of the authentication device 11 and in the solution generating section 374 of the encryption device 37 of the user device 12 and the environmental information is used as " ⁇ " or the like to generate solution data, it is possible to prevent a thirdpersonwho does not know the environmental information unique to the user device 12 from pretending to be the user, and to further improve the level of communication security.
  • can also be variable particular information, instead of being environmental information as described above.
  • This particular information can be information which spontaneously arises one after another as time elapses and can be obtained in common even from remote locations.
  • Examples of the particular information include information judged based on the weather in a particular region; information judged based on the content of television broadcasting of a television station, which is broadcasted at a particular time slot; and information judged based on a result of a particular sport.
  • the solution data generated by the solution generating section 374 of the user device 12 is sent from the interface section 371 to the communication device 38 via the bus 39.
  • the solution data is further sent from the communication section 383 of the communication device 38 to the communication device 28 of the authentication device 11 via the network 13.
  • solution data generated by the solution generating section 274 of the encryption device 27 of the authentication device 11 is sent from the interface section 271 to the judgement device 29 via the bus 30.
  • the authentication device 11 Upon reception of the solution data from the user device 12 (S1105), the authentication device 11 judges whether the received solution data matches the solution data generated in the authentication device 11 (S1106).
  • the communication device 28 receives the solution data from the user device 12
  • the solution data is sent from the interface section 281 of the communication device 28 to the judgement section 292 of the judgement device 29 via the bus 30.
  • the judgement section 292 collates the solution data received from the user device 12 with the solution data generated by the encryption device 27 of the authentication device 11 to judge whether those pieces of solution data match.
  • the judgement section 292 judges that the user device 12 is valid (S1107).
  • the judgement section 292 judges that the user device 12 is not valid (S1108).
  • the judgement section 292 also judges that the user device 12 is not valid (S1108).
  • transmission-object data is read based on a request from the user device 12.
  • the CPU 21 reads the transmission-object data from the HDD 23 and temporarily stores the transmission-object data, for example, in the RAM 24.
  • the transmission-object data is sent from the HDD 23 to the encryption device 27 via the bus 30.
  • the transmission-object data is sent to the pre-processing section 272 via the interface section 271.
  • the transmission-object data is divided in units of the predetermined number of bits to generate plaintext division data items.
  • the plaintext division data items are sent to the encryption and decryption section 273 and encrypted by using a given algorithm and a given key to generate encrypted division data items.
  • the encrypted division data items are sent to the connection section 275.
  • the connection section 275 connects the encrypted division data items to generate one piece of encrypted data. In this case, the order of the encrypted division data items corresponds to the original order of theplaintext division data items.
  • the encrypted data generated as described above is sent to the communication device 28 of the authentication device 11 via the bus 30.
  • the encrypted data is received by the interface section 281 of the communication device 28 and sent to the communication section 282.
  • the communication section 282 sends the encrypted data to the user device 12 via the network 13.
  • the encrypted data sent from the authentication device 11 to the user device 12 is received by the communication section 383 of the communication device 38 of the user device 12 and sent to the interface section 381.
  • the interface section 381 sends the encrypted data to the encryption device 37.
  • the pre-processing section 372 of the encryption device 37 receives the encrypted data via the interface section 371.
  • the pre-processing section 372 divides the received encrypted data in units of the predetermined number of bits to generate encrypted division data items.
  • the pre-processing section 372 performs the processing reverse to the processing performed in the connection section 275 of the authentication device 11. Specifically, the encrypted data is divided into a plurality of encrypted division data items in units of 8 bits from the top.
  • the encrypted division data items are sent to the encryption and decryption section 373 and are decrypted to generate plaintext division data items.
  • the decryption is performed by using the given algorithm and the key which have been used for the encryption performed in the authentication device 11.
  • the plaintext division data items generated as described above are sent to the connection section 375.
  • the connection section 375 receives the plaintext division data items and connects the plaintext division data items together to regenerate one piece of plaintext data, which is the original state of the transmission-object data before the encryption has been applied in the authentication device 11.
  • transmission-object data may be any type of data as long as the data needs to be sent from the user device 12 (the authentication device 11) to the authentication device 11 (the user device 12).
  • the transmission-object data is recorded in the HDD 33 (the HDD 23).
  • the transmission-object data may be the data read from another recording medium such as an external recording medium to the user device 12 or the authentication device 11.
  • the judgement section 292 of the judgement device 29 generates a solution request signal for requesting the user device 12 to send new solution data, at intervals of a predetermined period of time (for example, 30 seconds) after the transmission and reception of encrypted data are started.
  • the subsequent processes are performed as in S1103 to S1108 of FIG. 10 .
  • Solution data is generated in each of the user device 12 and the authentication device 11 based on this solution request signal.
  • the judgement section 292 of the judgement device 29 judges whether the solution data received from the user device 12 matches the solution data generated in the authentication device 11.
  • the judgement section 292 judges that the user device 12 is valid, and thus, the transmission and reception of encrypted data are continued.
  • the judgement section 292 judges that the user device 12 is not valid, and thus, the transmission and reception of encrypted data are ended.
  • the judgement of solution match is performed multiple times by using solutions generated sequentially.
  • the validity of the user device 12 is judged many times by performing the judgement of solution match multiple times while transmission and reception of transmission-object data are being performed.
  • transmission-object data and a solution are sent and received in parallel.
  • a packet which contains solution data is sent at predetermined intervals between transmission events of packets which contain transmission-object data.
  • Two data paths are established between the authentication device 11 and the user device 12 in the authentication system 1 of this embodiment. One of the two data paths is used to send and receive solution data, for judging the validity of the user device 12. The other one of the two data paths is used to send and receive encrypted data.
  • the transmission and reception method is not limited thereto.
  • the transmission and reception of transmission-object data including encrypted data, and the transmission and reception of a solution may be performed alternately in a time-division manner. Specifically, after communications are started, while solution data is being sent from the user device 12 to the authentication device 11, transmission-object data may not be sent or received. Specifically, for example, solution data may be sent in the header of each of packets which contain transmission-obj ect data. In other words, one data path may be established between the authentication device 11 and the user device 12 in the authentication system 1. The data path is used to send and receive solution data, for judging the validity of the user device 12, and also used to send and receive encrypted data.
  • a data path to receive a solution for judging the validity of the user device 12, from the user device 12 and a data path to send and receive transmission-object data may be identical to each other or may be separated from each other.
  • solution data itself which is generated in the user device 12 based on a solution request signal sent from the authentication device 11 is sent to the authentication device 11 via the network 13.
  • Transmission of the solution data is not limited thereto.
  • the solution data generated in the user device 12 may be encrypted in the encryption device 37 by using a given algorithm and a given key before being sent to the authentication device 11 via the network 13.
  • the level of security becomes higher than when the solution data itself is sent.
  • the configuration can be made such that solution data generated in the authentication device 11 is also encrypted by using the given algorithm and the given key in the encryption device 27, and the judgement device 29 compares the pieces of encrypted solution data to judge whether the pieces of encrypted solution data match.
  • the encryption device 27 of the authentication device 11 performs encryption of a solution generated by the solution generating section 274, in addition to decryption of encrypted data received from the user device 12 and encryption of transmission-object data held by the authentication device 11.
  • the encrypted solution data may be decrypted before the judgement device 29 compares the pieces of encrypted solution data to judge whether the pieces of encrypted solution data match.
  • the encryption device 27 of the authentication device 11 performs decryption of an encrypted solution received from the user device 12, in addition to decryption of encrypted data received from the user device 12 and encryption of transmission-object data held by the authentication device 11.
  • collation of pieces of solution data is performed in the authentication device 11 at intervals of a predetermined period of time while transmission and reception of transmission-object data are being performed between the authentication device 11 and the user device 12.
  • the collation of pieces of solution data may be performed at any timing as long as the collation is performed multiple times while the transmission and reception of transmission-object data are being performed.
  • the collation of pieces of solution data may be performed in the authentication device 11 every time the amount of data sent and received reaches a predetermined amount of data, while transmission and reception of transmission-object data are being performed between the authentication device 11 and the user device 12.
  • data held in the user device 12 which is generally recorded in the user device 12 can be sent to the authentication device 11 as the transmission-object data.
  • Data in the user device 12 which has been sent to the authentication device 11 may still remain in the user device 12 or may be deleted from the user device 12.
  • the data stored in the user device 12 can also be stored, as a backup copy thereof, in the authentication device 11 which is a device other than the user device 12, while preventing a third person from reading the data stored in the user device 12.
  • the authentication system 1 As described above, even after it is judged by the authentication device 11 that the user device 12 is valid, the validity of the user device is judged multiple times, and thus, the level of communication security during transmission and reception of transmission-object data is very high. Accordingly, when the authentication system 1 is used, the user device 12 can make a backup copy of data of the user device 12 while keeping the same security level as when the data is stored in the user device 12.
  • the authentication device 11 can be used as a safe-deposit box in the network.
  • the following processing or the like may be performed: the data stored in the user device 12 is encrypted by using a solution generated by the solution generating section 274 of the encryption device 27, which is unique to each user device 12, and encrypted data is sent to the authentication device 11; and the user device 12 stores the order of the solution used to encrypt the data among the solutions generated by the solution generating section 274.
  • the encrypted data sent to the authentication device 1 can be decrypted only by the user device 12 having the encryption device 27 which has been used to encrypt the data, only the user of the user device 12 can read the data while the others cannot decrypt the encrypted data.
  • encrypted data obtained from the given piece of data can be decrypted only by the user of the user device 12 having the encryption device 27 which has been used to encrypt the data or by the first person having the encryption device which generates the solution used to encrypt the given piece of data.
  • encrypted data obtained from the other given piece of data can be decrypted only by the user of the user device 12 having the encryption device 27 which has been used to encrypt the data or by the second person having the encryption device which generates the solution used to encrypt the other givenpiece of data.
  • the encrypted data obtained from the given piece of data cannot be decrypted by persons including the second person other than the user of the user device 12 and the first person.
  • the encrypted data obtained from the other given piece of data cannot be decrypted by persons including the first person other than the user of the user device 12 and the second person. It can be made possible for the user to specify, for each piece of data, a person who can read the data.
  • the validity of the user device 12 is judged by collating solution data generated in the user device 12 with solution data generated in the authentication device 11 to judge whether those pieces of solution data match.
  • the authentication device 11 and the user device 12 have identical common data (for example, ID data, a password unique to the user device 12, or the like)
  • the validity of the user device 12 may be judged by using the common data instead of using solution data.
  • the validity of the user device 12 may be judged by sending encrypted common data which is obtained when common data held by the user device 12 is encrypted by the encryption device, instead of sending solution data from the user device 12 to the authentication device 11, and collating, in the authentication device 11, data obtained by decrypting the encrypted common data with common data held by the authentication device 11 to judge whether those pieces of common data match. Further, the validity of the user device 12 may be judged in the authentication device 11 by collating the encrypted common data received from the user device 12 with encrypted common data which is obtained when the encryption device encrypts in advance common data held by the authentication device 11 to judge whether those pieces of encrypted common data match.
  • an algorithm and a key to be used for encryption performed in the user device 12 are not fixed but are sequentially generated anew by using solutions to be sequentially generated in the user device 12 and the authentication device 11.
  • FIG. 11 shows an encryption device 47 used in the user device 12 according to Modification 1.
  • the encryption device 47 includes an interface section 471, apre-processing section 472, an encryption and decryption section 473, a solution generating section 474, a connection section 477, an algorithm generating section 475, and a key generating section 476.
  • the algorithm generating section 475 generates an algorithm based on a solution received from the solution generating section 474.
  • the algorithm is used when the encryption and decryption section 473 performs encryption processing and decryption processing.
  • the key generating section 476 generates a key based on the solution received from the solution generating section 474.
  • the key is used when the encryption and decryption section 473 performs encryption processing and decryption processing.
  • the keys generated by the key generating section 476 of the user device 12 are identical to the keys generated, in the same order as in the key generating section 476, by a key generating section 576 of the authentication device 11.
  • an encryption device 57 used in the authentication device 11 in Modification 1 has the same configuration as the encryption device 47.
  • the encryption device 57 includes an interface section 571, a pre-processing section 572, an encryption and decryption section 573, a solution generating section 574, an algorithm generating section 575, the key generating section 576, and a connection section 577, which correspond to the interface section 471, the pre-processing section 472, the encryption and decryption section 473, the solution generating section474, thealgorithmgeneratingsection475, the key generating section 476, and the connection section 477 of the encryption device 47, respectively.
  • the authentication device 11 When the authentication device 11 is accessed by the user device 12 (S2101), the authentication device 11 judges whether ID data sent from the user device 12 has been registered (S2102).
  • the processes of S2101 and S2102 correspond to the processes of S1101 and S1102 of FIG. 10 .
  • the authentication device 11 When the ID data sent from the user device 12 has been registered in the authentication device 11 (when ID data that matches the received ID data is included) (Yes in S2102), the authentication device 11 sends a common-data request signal to the user device 12 (S2103).
  • the judgement section 292 of the judgement device 29 generates the common-data request signal for requesting the user device 12 to send common data.
  • the common-data request signal is sent from the interface section 291 to the communication device 28 and the encryption device 57 via the bus 30.
  • the common-data request signal is further sent from the communication device 28 to the user device 12.
  • the user device 12 When the common-data request signal is received, the user device 12 generates encrypted common data to be sent to the authentication device 11.
  • the common-data request signal is received by the communication device 38 and is sent to the CPU 31 and to the interface section 471 of the encryption device 47 via the bus 39.
  • the interface section 471 of the encryption device 47 sends data indicating that the common-data request signal has been received, to the solution generating section 474.
  • the solution generating section 474 receives the data.
  • the solution generating section 474 starts to generate a solution. How to generate a solution has been described above. Note that, the generated solution is sent to the algorithm generating section 475 and the key generating section 476 and at the same time is stored in the solution generating section 474.
  • the CPU 31 reads common data. Specifically, the CPU 31 reads the common data from the HDD 33 and temporarily stores the common data, for example, in the RAM 34.
  • the common data is sent from the HDD 33 to the encryption device 47 via the bus 39.
  • the common data is sent to the pre-processing section 472 via the interface section 471.
  • the common data is divided in units of the predetermined number of bits to generate plaintext division data items.
  • the plaintext division data items thus generated are sent to the encryption and decryption section 473 in a stream manner, in the order of the generation of the plaintext division data items.
  • the algorithm generating section 475 In parallel to the generation of the plaintext division data items, the algorithm generating section 475 generates an algorithm to be used to encrypt the plaintext division data items.
  • the algorithm generating section 475 generates an algorithm based on a solution.
  • the algorithm generating section 475 generates an algorithm as defined below.
  • a is assumed to be a predetermined constant.
  • “a” varies according to the solution.
  • the algorithm used in this embodiment varies according to the solution.
  • n is a number predetermined by a key.
  • the key is a constant, “n” is fixed.
  • the key varies according to the solution. In other words, “n” also varies according to the solution in this embodiment.
  • the algorithm generating section 475 generates an algorithm every time a solution is received from the solution generating section 474, and sends the algorithm to the encryption and decryption section 473.
  • the key generating section 476 In parallel to the generation of the plaintext division data items, the key generating section 476 generates a key to be used to encrypt the plaintext division data items.
  • the key generating section 476 generate a key based on the solution.
  • the key generating section 476 generate a key as defined below.
  • a key used in this embodiment is a number obtained by adding all numbers of the elements included in a solution matrix of 8 rows by 8 columns. Thus, in this embodiment, the key varies based on the solution.
  • the key generating section 476 generates a key every time a solution is received from the solution generating section 474, and sends the key to the encryption and decryption section 473.
  • the encryption and decryption section 473 encrypts the plaintext division data items received from the pre-processing section 472, based on the algorithm received from the algorithm generating section 475 and the key received from the key generating section 476.
  • Data items generated through the processing are encrypted division data items.
  • the encrypted division data items are sent to the connection section 477.
  • the connection section 477 connects the encrypted division data items together to generate one piece of encrypted data. At that time, the order of the encrypted division data items corresponds to the original order of the plaintext division data items.
  • the encrypted common data generated as described above is sent to the communication device 38 of the user device 12 via the bus 39.
  • the encrypted common data is received by the interface section 381 of the communication device 38, and sent to the communication section 383 after ID data is added to the encrypted common data in the ID data adding section 382.
  • the communication section 383 sends the encrypted common data to the authentication device 11 via the network 13.
  • the authentication device 11 receives the encrypted common data sent from the user device 12 (S2104).
  • the communication section 282 of the communication device 28 of the authentication device 11 receives the encrypted common data.
  • the communication section 282 sends the encrypted common data to the interface section 281.
  • the interface section 281 sends the encrypted common data to the encryption device 57 via the bus 30.
  • the encryption device 57 receives the encrypted common data via the bus 30 and decrypts the encrypted common data (S2105).
  • the pre-processing section 572 of the encryption device 57 receives the encrypted common data via the interface section 571.
  • the pre-processing section 572 divides the received encrypted data in units of a predetermined number of bits to generate encrypted division data items.
  • the pre-processing section 572 performs the processing reverse to the processing performed in the connection section 477 of the user device 12. Specifically, the encrypted data is divided into multiple encrypted division data items in units of 8 bits from the top.
  • the encrypted division data items are sent to the encryption and decryption section 573 and decrypted to generate plaintext division data items.
  • the decryption is performed as the processing reverse to that performed in the encryption and decryption section 473 of the user device 12. For this reason, the authentication device 11 requires the algorithm and key which have been required for the encryption performed in the user device 12.
  • the algorithm and key to be used for the decryption are generated in the encryption device 57. This generation mechanism will be described below.
  • the solution generating section 574 generates a solution every time this information is received.
  • the solution generating section 574 of the encryption device 57 of the authentication device 11 generates a solution through the same processing which has been performed in the solution generating section 474 of the user device 12.
  • the solution generating section 574 has a solution generation algorithm and the same initial matrices as those associated with the ID data of the user device 12 and held by the solution generating section 474 of the user device 12. Therefore, a solution generated in the authentication device 11 is identical to the solution generated in the same order in the encryption device 47 of the user device 12 while transmission and reception of data are being performed.
  • the generated solution is sent from the solution generating section 574 to the pre-processing section 572, the algorithm generating section 575, and the key generating section 576.
  • the algorithm generating section 575 Every time a solution is received, the algorithm generating section 575 generates an algorithm based on the received solution.
  • the algorithm generation process performed by the algorithm generating section 575 of the authentication device 11 is the same as the algorithm generation process performed by the algorithm generating section 475 of the user device 12.
  • the generated algorithm is sent from the algorithm generating section 575 to the encryption and decryption section 573.
  • the key generating section 476 generates a key based on the received solution.
  • the key generation process performed by the key generating section 576 of the authentication device 11 is the same as the key generation process performed by the key generating section 576 of the user device 12.
  • the generated key is sent from the key generating section 576 to the encryption and decryption section 573.
  • a new solution is generated in the authentication device 11. Further, as described above, a solution generated in the encryption device 57 of the authentication device 11 is identical to the solution generated in the same order in the encryption device 47 of the corresponding user device 12.
  • a solution generated when common data is encrypted in the user device 12 and an algorithm and a key which are generated based on the solution are always identical to a solution generated in the encryption device 57 of the authentication device 11 and an algorithm and a key which are generated based on the solution, during decryption applied to the encrypted common data generated using the algorithm and key generated based on the solution in the user device 12.
  • the encryption and decryption section 573 performs decryption processing by using the algorithm received from the algorithm generating section 575, as described above. More specifically, based on the algorithm (in which "a solution matrix "X” of 8 rows by 8 columns to the power of "a” is rotated clockwise by "n x 90°” and then is multiplied by a matrix “Y” of 1 row by 8 columns obtained from an 8-bit plaintext division data item to generate an encrypted division data item") received from the algorithm generating section 575, the encryption and decryption section 573 generates an algorithm for decryption processing, (in which "a solution matrix "X” of 8 rows by 8 columns to the power of "a” is rotated clockwise by "n x 90°” and then is multiplied by "Y” to generate a plaintext division data item, when an encrypted division data item is regarded as a matrix "Z” of 1 row by 8 columns”), and performs the calculation according to the above-mentioneddefinitionbyusing the key, thereby performing the
  • the plaintext division data items thus generated are sent to the connection section 577.
  • the connection section 577 connects the received plaintext division data items together to obtain the original common data used before the encryption was applied in the user device 12.
  • the decrypted common data is sent from the interface section 571 of the encryption device 57 to the judgement section 292 of the judgement device 29 via the bus 30. Further, common data held by the authentication device 11 is read by the CPU 21 from the HDD 23 and sent to the judgement section 292 of the judgement device 29 via the bus 30.
  • the judgement section 292 collates the common data which has been received from the user device 12 and to which the decryption has been applied, with the common data held by the authentication device 11 to judge whether they match (S2106).
  • the judgement section 292 judges that the user device 12 is valid (S2107).
  • the judgement section 292 judges that the user device 12 is not valid (S2108).
  • the validity of the user device 12 which has accessed the authentication device 11 is judged by the authentication device 11.
  • Modification 1 it is assumed that transmission and reception of transmission-object data are not performed while solution data is being sent from the user device 12 to the authentication device 11 (in other words, transmission and reception of transmission-object data and transmission and reception of solution data are performed alternately in a time-division manner).
  • the data transmission and reception method is not limited to this. Data transmission and reception may be performed in parallel to transmission and reception of encrypted common data.
  • each user device 12 has the encryption device 37 unique to the user device 12.
  • each user device may have, in addition to the encryption device unique to the user device, an encryption device common to multiple user devices connected to the authentication device.
  • Modification 2 including such a user device will be described in detail below.
  • FIG. 14 is a schematic diagram showing an entire configuration of an authentication system 3 according to Modification 2.
  • the authentication system 3 includes "n" user devices 62 which include user devices 62A, 62B, and 62C, and an authentication device 61.
  • FIG. 15 shows a hardware configuration of the user device 62.
  • the hardware configuration of the user device 62 is basically the same as that of the user device 12. However, the user device 62 is different from the user device 12 in that, while the user device 12 has one encryption device 37, the user device 62 has, instead of the encryption device 37, two kinds of encryption devices, i.e. , a first encryption device 37A and a second encryption device 37B.
  • the first encryption device 37A is different for each user device, such as the encryption device 37 of the user device 12.
  • the second encryption device 37B is an encryption device common to the multiple user devices 62 (in this Modification, the "n" user devices 62).
  • processings of encryption and decryption of the first encryption device 37A are performed using a given algorithm and a given key which are unique to the first encryption device 37A of the user device 62.
  • processings of encryption and decryption of the second encryption device 37B are performed using a given algorithm and a given key which are unique to and common to the second encryption devices 37B of the user devices 62.
  • the CPU 31, the ROM 32, the HDD 33, the RAM 34, the input device 35, the display device 36, the communication device 38, and the bus 39 are identical to those of the user device 12, respectively.
  • FIG. 16 shows a hardware configuration of the authentication device 61.
  • the hardware configuration of the authentication device 61 is different from that of the authentication device 11 in that, while the authentication device 11 has one encryption device 27, the authentication device 61 has, instead of the encryption device 27, two kinds of encryption devices, i.e. , first encryption devices 27A and a second encryption device 27B.
  • first encryption devices 27A are provided as that of the user devices 62, and each first encryption device 27A sequentially generates a solution identical to that generated by the first encryption device 37A of the corresponding user device 62, in the same order.
  • the second encryption device 27B sequentially generates a solution identical to that generated by the second encryption device 37B of the user device 62, in the same order.
  • the CPU 21, the ROM 22, the HDD 23, the RAM 24, the input device 25, the display device 26, the communication device 28, the judgement device 29, and the bus 30 are identical to those included in the authentication device 61, respectively.
  • the multiple user devices 62 having the same second encryption devices 37B can also access the same data, thereby improving the convenience.
  • processings of encryption and decryption of the encryption devices of the user device 62 and the authentication device 61 according to Modification 2 are performed by using a given algorithm and a given key which are unique.
  • the algorithm and the key are not limited to those used above.
  • the algorithm and the key may be sequentially generated anew at a predetermined timing by using solutions sequentially generated in the first encryption device 37A or the second encryption device 37B of the user device 62 and the first encryption device 27A corresponding to the first encryption device 37A or the second encryption device 27B corresponding to the second encryption device 37B, of the authentication device 61.
  • environmental information unique to each user device 62 may be used, as in the above-mentioned embodiment.
  • the environmental information unique to each user device 62 is hardly obtained by devices other than the user device 62 and the authentication device 61 in which the environmental information has been registered.
  • the environmental information cannot be obtained from the outside.
  • environmental information unique to the authentication device 61 may be used. Specifically, environmental information of the authentication device 61 is registered in advance in the second encryption device 27B of the authentication device 61 and the second encryption device 37B of each user device 62, and the registered environmental information is used to generate a solution.
  • the environmental information unique to the authentication device 61 is hardly obtained by devices other than the authentication device 61 and the user device 62 in which the environmental information has been registered.
  • the environmental information cannot be obtained from the outside.
  • the environmental information unique to the authentication device 61 is used, there is a possibility that the user device 62 can be prevented from accessing a fake authentication device, such as the authentication device 61 of a malicious third person who fakes address information of the authentication device 61.
  • the environmental information unique to the authentication device 61 can be information of a peripheral device connected to the authentication device 61, for example.
  • the information of a peripheral device connected to the authentication device 61 include the address information or the MAC address information of a router allocated to the authentication device 61, information on the type or the serial number of a printer connected to the authentication device 61, information of a server connected to the authentication device 61, and information of a mouse connected to the authentication device 61.
  • the environmental information unique to the authentication device 61 may also be information in the authentication device 61.
  • the information used in the authentication device 61 include folder name information of a folder containing particular data or a predetermined folder, included in the authentication device 61, file name information of a predetermined file, and address information, hierarchical information, and byte-count information of the folder or file.

Abstract

In order to reduce a possibility of an unauthorized access by a user device after the user device has been authenticated and to improve the level of communication security, in an authentication system (1), even after an authentication device (11) judges that a user device (12) is valid, the validity of the user device (12) is judged multiple times while transmission and reception of transmission-object data are being performed. According to the authentication system (1), the possibility of the unauthorized access to be made after authentication can be reduced and the level of communication security can be improved.

Description

    Technical Field
  • The present invention relates to an authentication system including a user device and an authentication device which receives, from the user device, a solution that is a pseudorandom number sequentially generated in the user device and judges the validity of the user device by using the received solution.
  • Background of the Invention
  • In general, services that use communications, such as Internet banking services provided by banks, are offered when multiple user devices serving as client terminals access an authentication device serving as a server terminal through the Internet. In such online services, since data transmission-obj ect whose content is desirably prevented from being known by a third person is sent and received (The data to be sent is referred to as "transmission-object data" in this application), authentication techniques for judging the validity of each of the user devices are used in order to prevent an unauthorized access.
    • [Patent Document 1] JP 2006-253746 A
    • [Patent Document 2] JP 2006-253745 A
  • For example, according to the inventions disclosed in above-mentioned Patent Documents and made by the inventor of this application, authentication is performed as follows: solution generating means for sequentially generating a solution that is a pseudorandom number is stored in advance in each of the authentication device and the user device; when the authentication device is accessed by the user device, the authentication device receives a solution generated in the user device and collates the received solution with a solution generated by the solution generating means of the authentication device to judge whether the solutions match; then, when the solutions match, it is judged that the user device is valid. Note that the solution generating means of the user device is the same as the solution generating means of the authentication device, and those two solution generating means sequentially generate the same solutions in the same order.
  • According to the authentication techniques, only an authorized user device which has the same solution generating means as that of the authentication device is judged to be an authorized user device, and then, transmission and reception of transmission-object data are started.
  • However, in a case where once the user device is judged to be an authorized user device, there is a possibility that, while the transmission and reception of transmission-object data are being performed, the transmission-object data is accessed from another device by a third person who masquerades as an authorized user.
  • Objects of the present invention are to reduce a possibility of such an unauthorized access to be made after authentication and to improve the level of communication security.
  • Disclosure of the Invention
  • In order to achieve the objects, the inventor of this application proposes the following authentication system.
  • An authentication system according to this application includes: a user device; and an authentication device for judging whether the user device is valid.
  • The user device includes: solution generating means for sequentially generating a solution that is a pseudorandom number; solution transmission means for sending the solution generated by the solution generating means to the authentication device; and transmission and reception means for performing transmission and reception of transmission-object data with the authentication device when the authentication device judges that the user device is valid.
  • Further, the authentication device includes: solution generating means for sequentially generating a solution identical to the solution generated in the user device, in the same order as in the user device; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, and the judgement means performs the judgement multiple times by using solutions sequentially generated, while transmission and reception of the transmission-object data are being performed with the user device.
  • In this authentication system, the judgement is performed multiple times by using solutions sequentially generated, while transmission and reception of the transmission-obj ect data are being performed with the user device. In other words, in this authentication system, even in a case where once the user device is judged to be an authorized user device, the validity of the user device is judged many times by performing the judgement multiple times while transmission and reception of the transmission-object data are being performed. Thus, according to this authentication system, it is possible to reduce a possibility of an unauthorized access to be made after authentication and to improve the level of communication security. Further, the validity of the user device is judged by using solutions sequentially generated anew, in other words, by using a different solution each time, so the level of communication security can be further improved.
  • Further, the inventor of this application proposes the following authentication system.
  • Specifically, an authentication system according to this application includes: at least two user devices; and an authentication device for judging whether each of the user devices is valid.
  • Each of the user devices includes: a first user solution generating means and a second user solution generating means each for sequentially generating a solution that is a pseudorandom number; solution transmission means for sending the solution generated by the first user solution generating means or the second user solution generating means to the authentication device; and transmission and reception means for performing transmission and reception of transmission-object data with the authentication device when the authentication device judges that the user device is valid, the first user solution generating means is unique to each of the user devices, and the second user solution generating means is common to predetermined user devices(some of user devices).
  • Further, the authentication device includes: a number of first authentication solution generating means, the number being the same as that of the user devices, each for sequentially generating a solution identical to the solution generated by the first user solution generating means of a corresponding user device, in the same order as in the first user solution generating means; a second authentication solution generating means for sequentially generating a solution identical to the solution generated by the second user solution generating means of the user device, in the same order as in the second user solution generating means; a first judgement means for judging whether a user device is valid by using a solution generated by the first user solution generating means of the user device and received from the user device and the solution generated by the first authentication solution generating means corresponding to the user device; a second judgement means for judging whether a user device is valid by using a solution generated by the second user solution generating means of the user device and received from the user device and the solution generated by the second authentication solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the first judgement means or the second judgement means judges that the user device is valid, and the first judgement means or the second judgement means performs the judgement multiple times by using solutions sequentially generated, while transmission and reception of the transmission-object data are being performed with the user device.
  • In addition, according to the authentication system, the same data can be accessed by multiple user devices which have the same second user solution generating means.
  • Further, the inventor of this application proposes the following authentication device.
  • Specifically, an authentication device according to this application receives a solution that is a pseudorandom number sequentially generated in a user device from the user device and judges whether the user device is valid by using the received solution.
  • This authentication device includes: solution generating means for sequentially generating a solution identical to the solution generated in the user device, in the same order as in the user device; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, in which the judgement means performs the judgement multiple times by using solutions sequentially generated, while transmission and reception of the transmission-object data are being performed with the user device.
  • In the authentication device, the judgement is performed multiple times by using solutions sequentially generated, while transmission and reception of the transmission-object data are being performed with the user device. In other words, as described above, even in the case where once the user device is judged to be an authorized user device, the validity of the user device is judged multiple times while transmission and reception of the transmission-object data are being performed. Thus, according to this authentication device, it is possible to reduce a possibility of an unauthorized access to be made after the authentication and to improve the level of communication security.
  • The judgement means may perform the judgement at any timing as long as the judgement is performed multiple times by using solutions sequentially generated, while transmission and reception of the transmission-object data are being performed with the user device. For example, during the transmission and reception of the transmission-object data performed with the user device, the judgement means may perform the judgement at intervals of a predetermined period of time or every time the amount of data sent and received by the transmission and reception means reaches a predetermined amount of data. Note that the predetermined period of time (the predetermined amount of data) may or may not be a fixed period of time (a fixed amount of data).
  • Further, a solution generated in the user device may be sent to the authentication device as it is or may be encrypted before being sent to the authentication device.
  • Specifically, the solution generated in the user device may be sent to the authentication device as it is (without being encrypted).
  • Further, the solution generated in the user device may be encrypted by using a predetermined algorithm and a predetermined key and then sent to the authentication device, the authentication device may further include solution encrypting means for encrypting the solution generated by the solution generating means, by using the predetermined algorithm and the predetermined key, and the judgement means may collate the encrypted solution received from the user device with the solution encrypted by the solution encrypting means, and judge, when the solutions match, that the user device is valid.
  • Further, the solution generated in the user device may be encrypted by using a predetermined algorithm and a predetermined key and then sent to the authentication device, the authentication device may further include solution decrypting means for decrypting the encrypted solution received from the user device, by using the predetermined algorithm and the predetermined key used when the solution was encrypted in the user device, and the judgement means may collate the solution decrypted by the solution decrypting means with the solution generated by the solution generating means, and judge, when the solutions match, that the user device is valid.
  • Note that the predetermined algorithm or the predetermined key may be a fixed algorithm or key which is not changed. At least one of the predetermined algorithm and the predetermined key may be sequentially generated anew at a predetermined timing by using solutions sequentially generated in the user device and the authentication device.
  • Further, the user device may divide original plaintext data into multiple plaintext division data items in units of a predetermined number of bits, encrypts the multiple plaintext division data items by using a predetermined algorithm and a predetermined key to generate encrypted division data items, and send the encrypted division data items to the authentication device as the transmission-object data, and the authentication device may further include: decryption means for decrypting the encrypted division data items by using the predetermined algorithm and predetermined key used when the multiple plaintext division data items are encrypted, to generate plaintext division data items; and connection means for connecting the plaintext division data items decrypted by the decryption means to generate decrypted data.
  • The authentication device may hold data identical to the transmission-object data held by the user device, and the judgement means may collate the decrypted data decrypted by the decryption means with the data identical to the transmission-object data, and judge, when those pieces of data match, that the user device is valid.
  • Further, the authentication device may hold data identical to the transmission-object data held by the user device, the authentication device may further include: division means for dividing the data identical to the transmission-object data into units of a predetermined number of bits to generate division data items; and encryption means for encrypting the division data items by using the predetermined algorithm and the predetermined key, and the judgement means may collate the encrypted division data items received from the user device with the division data items encrypted by the encryption means, and judge, when those pieces of data match, that the user device is valid.
  • When the authentication device has data identical to the transmission-object data held by the user device, the data can be used to judge the validity of the user device.
  • Means for establishing two data paths between the authentication device and the user device may be provided, one of the two data paths being used to perform transmission and reception of the solution to be used to judge the validity of the user device, and the other one of the two data paths being used to perform transmission and reception of the transmission-object data. In that case, the transmission-object data and the solution are sent and received in parallel, and the transmission-object data and the solution are sent and received alternately in a time-division manner. Specifically, for example, the transmission-object data and the solution are sent and received alternately in a time-division manner when a packet which contains solution data is sent at predetermined intervals between transmission events of packets which contain transmission-object data.
  • Further, means for establishing one data path between the authentication device and the user device may be provided, the one data path being used to perform transmission and reception of the solution to be used to judge the validity of the user device, and being also used to perform transmission and reception of the transmission-object data. Specifically, for example, the one data path is used when the solution data is contained in the header of each of packets which contain the transmission-object data and is sent.
  • As described above, a data path used to receive, from the user device, a solution for judging the validity of the user device and a data path used to send and receive transmission-object data may be identical to each other or may be separated from each other.
  • At least one of the predetermined algorithm and the predetermined key may be sequentially generated anew at a predetermined timing by using the solutions sequentially generated in the user device and the authentication device.
  • Further, the inventor of this application proposes the following authentication device.
  • An authentication device is used in combination with at least two user devices to judge whether each of the user devices is valid, each of the user devices including: a first user solution generating means and a second user solution generating means each for sequentially generating a solution that is a pseudorandom number; solution transmission means for sending the solution generated by the first user solution generating means or the second user solution generating means to the authentication device; and transmission and reception means for performing transmission and reception of transmission-object data with the authentication device when the authentication device judges that the user device is valid, the first user solution generating means being unique to each of the user devices, and the second user solution generating means being common to predetermined user devices.
  • The authentication device includes: a number of first authentication solution generating means, the number being the same as that of the user devices, each for sequentially generating a solution identical to the solution generated by the first user solution generating means of a corresponding user device, in the same order as in the first user solution generating means; a second authentication solution generating means for sequentially generating a solution identical to the solution generated by the second user solution generating means of the user device, in the same order as in the second user solution generating means; a first judgement means for judging whether a user device is valid by using a solution generated by the first user solution generating means of the user device and received from the user device and the solution generated by the first authentication solution generating means corresponding to the user device; a second judgement means for judging whether a user device is valid by using a solution generated by the second user solution generating means of the user device and received from the user device and the solution generated by the second authentication solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the first judgement means or the second judgement means judges that the user device is valid, in which the first judgement means or the second judgement means performs the judgement multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device.
  • With the use of the authentication device, the same data can be accessed by multiple user devices which have the same second user solution generating means, as described above.
  • The same operation and effect as provided by the authentication device including the judgement means can be obtained by the following method, for example.
  • An authentication method is executed in an authentication device which includes: reception means for receiving a solution that is a pseudorandom number sequentially generated in a user device from the user device; and judgement means for judging whether the user device is valid by using the received solution.
  • Further, the authentication method includes the steps performed by the authentication device of: sequentially generating a solution identical to the solution generated in the user device, in the same order as in the user device; judging whether a user device is valid by using a solution received from the user device and the generated solution; and performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, and the judgement is performed multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device.
  • This application also provides an authentication method executed in an authentication device which includes: reception means for receiving, from a user device, a solution that is a pseudorandom number sequentially generated by solution generating means unique to the user device or a solution that is a pseudorandom number sequentially generated by solution generating means common to predetermined user devices; and judgement means for judging whether the user device is valid by using the received solution.
  • The authentication method includes the steps performed by the authentication device of: sequentially generating a solution identical to the solution generated by the solution generating means unique to the user device, in the same order as in the solution generating means unique to the user device, when the solution generated by the solution generating means unique to the user device is received from the user device; sequentially generating a solution identical to the solution generated by the solution generating means common to the predetermined user devices, in the same order as in the solution generating means common to the predetermined user devices, when the solution generated by the solution generating means common to the predetermined user devices is received from the user device; judging whether a user device is valid by using a solution received from the user device and the solution generated in the authentication device; and performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, and the judgement is performed multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device.
  • Further, the inventor of this application proposes the following user device.
  • Specifically, a user device according to this application is used in combination with an authentication device, the authentication device receiving a solution that is a pseudorandom number sequentially generated in the user device from the user device, judging whether the user device is valid by using the received solution, and including: solution generating means for sequentially generating a solution that is a pseudorandom number; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, the judgement means performing the judgement multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device.
  • The user device includes: solution generating means for sequentially generating a solution identical to the solution generated in the authentication device, in the same order as in the authentication device; solution transmission means for sending the solution generated by the solution generating means to the authentication device; and transmission and reception means for performing the transmission and reception of the transmission-object data with the authentication device when the authentication device judges that the user device is valid.
  • When the user device is used in combination with the authentication device,thejudgementcan be performed multipletimes by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device, as described above.
  • The user device may further include solution encrypting means for encrypting the solution generated by the solution generating means by using a predetermined algorithm and a predetermined key, and may send the solution encrypted by the solution encrypting means to the authentication device.
  • Further, the inventor of this application proposes the following user device.
  • Specifically, another user device according to this application is used in combination with an authentication device, the authentication device receiving a solution that is a pseudorandom number sequentially generated in the user device from the user device, judging whether the user device is valid by using the received solution, and including: a first authentication solution generating means and a second authentication solution generating means each for sequentially generating a solution that is a pseudorandom number; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the first authentication solution generating means or the second authentication solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, the same number of the first authentication solution generating means being provided as that of the user device and each being unique to the corresponding user device, the second authentication solution generating means being common to predetermined user devices, the judgement means performing the judgement multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device.
  • The user device includes: a first user solution generating means unique to each of the user devices, for sequentially generating a solution identical to the solution generated by the corresponding first authentication solution generating means of the authentication device, in the same order as in the first authentication solution generating means; a second user solution generating means common to predetermined user devices, for sequentially generating a solution identical to the solution generated by the second authentication solution generating means of the authentication device, in the same order as in the second authentication solution generating means; solution transmission means for sending the solution generated by the first user solution generating means or the second user solution generating means to the authentication device; and transmission and reception means for performing the transmission and reception of the transmission-object data with the authentication device when the authentication device judges that the user device is valid.
  • With the use of the user device, the same data can be accessed by multiple user devices which have the same second user solution generating means, as described above.
  • Note that the above-described user device of the present invention is used in combination with any one of the above-described authentication devices.
  • The same operation and effect as provided by the above-described user device including the solution generating means can be obtained by the following method, for example.
  • A data processing method according to this application is executed in a user device used in combination with an authentication device, the authentication device receiving a solution that is a pseudorandom number sequentially generated in the user device from the user device, judging whether the user device is valid by using the received solution, and including: solution generating means for sequentially generating a solution that is a pseudorandom number; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, the judgement means performing the judgement multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device.
  • Further, the data processing method includes the steps performed by the user device of: sequentially generating a solution identical to the solution generated in the authentication device, in the same order as in the authentication device; sending the generated solution to the authentication device; and performing the transmission and reception of the transmission-object data with the authentication device when the authentication device judges that the user device is valid.
  • Further, another data processing method according to this application is executed in a user device used in combination with an authentication device, the authentication device receiving a solution that is a pseudorandom number sequentially generated in the user device from the user device, judging whether the user device is valid by using the received solution, and including: a first authentication solution generating means and a second authentication solution generating means each for sequentially generating a solution that is a pseudorandom number; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the first authentication solution generating means or the second authentication solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, the same number of the first authentication solution generating means being provided as that of the user device and each being unique to the corresponding user device, the second authentication solution generating means being common to predetermined user devices, the judgement means performing the judgement multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device.
  • Further, the data processing method includes the steps performed by the user device of: sequentially generating a solution identical to the solution generated by the first authentication solution generating means or the second authentication solution generating means of the authentication device, in the same order as in the first authentication solution generating means or the second authentication solution generating means of the authentication device; sending the generated solution to the authentication device; and performing the transmission and reception of the transmission-object data with the authentication device when the authentication device judges that the user device is valid.
  • According to the present invention, it is possible to reduce a possibility of an unauthorized access to be made after the user device is authenticated and to improve the level of communication security.
  • Brief Description of the Drawings
    • FIG. 1 is a diagram showing an entire configuration of an authentication system according to an embodiment.
    • FIG. 2 is a diagram showing a hardware configuration of an authentication device included in the authentication system shown in FIG. 1.
    • FIG. 3 is a block diagram showing a configuration of a communication device of the authentication device included in the authentication system shown in FIG. 1.
    • FIG. 4 is a block diagram showing a configuration of an encryption device of the authentication device included in the authentication system shown in FIG. 1.
    • FIG. 5 is a block diagram showing a configuration of a judgement device of the authentication device included in the authentication system shown in FIG. 1.
    • FIG. 6 is a diagram showing a hardware configuration of a user device included in the authentication system shown in FIG. 1.
    • FIG. 7 is a block diagram showing a configuration of an encryption device of the user device included in the authentication system shown in FIG. 1.
    • FIG. 8 is a block diagram showing a configuration of a communication device of the user device included in the authentication system shown in FIG. 1.
    • FIG. 9 is a flowchart showing a flow of processing performed in the authentication device of the authentication system shown in FIG. 1.
    • FIG. 10 is a flowchart showing a flow of processing of judging validity of the user device which has accessed the authentication device.
    • FIG. 11 is a block diagram showing a configuration of an encryption device of a user device according to Modification 1.
    • FIG. 12 is a block diagram showing a configuration of an encryption device of an authentication device according to Modification 1.
    • FIG. 13 is a flowchart showing a flow of processing performed in the authentication device of an authentication system according to Modification 1.
    • FIG. 14 is a block diagram showing an entire configuration of an authentication system according to Modification 2.
    • FIG. 15 is a diagram showing a hardware configuration of a user device according to Modification 2.
    • FIG. 16 is a diagram showing a hardware configuration of an authentication device according to Modification 2.
    Best Mode for carrying out the Invention
  • Hereinafter, a preferred embodiment of the present invention will be described in detail with reference to the drawings.
  • An authentication system 1 according to this embodiment is configured as schematically shown in FIG. 1. The authentication system 1 includes an authentication device 11 and user devices 12 connected to the authentication device 11 via a network 13.
  • The network 13, which connects the authentication device 11 to each of the user devices 12, is the Internet, for example.
  • The network 13 may be configured by another means such as an intranet or a dedicated line, instead of the Internet.
  • Hereinafter, a description will be given of configurations of the authentication device 11 and the user device 12. First, the configuration of the authentication device 11 will be described.
  • FIG. 2 shows a hardware configuration of the authentication device 11. As shown in FIG. 2, in this embodiment, the authentication device 11 includes a central processing unit (CPU) 21, a read only memory (ROM) 22, a hard disk drive (HDD) 23, a random access memory (RAM) 24, an input device 25, a display device 26, encryption devices 27, a communication device 28, a judgement device 29, and a bus 30. The CPU 21, the ROM 22, the HDD 23, the RAM 24, the input device 25, the display device 26, the encryption devices 27, the communication device 28, and the judgement device 29 can exchange data with each other via the bus 30.
  • In the ROM 22 or the HDD 23, a predetermined program and predetermined data are recorded (the predetermined data sometimes includes transmission-object data. In this embodiment, the predetermined data includes transmission-object data. The predetermined data also includes data necessary to execute the predetermined program).
  • The CPU 21 controls the entire authentication device 11, and performs processing described later based on the program and the data stored in the ROM 22 or the HDD 23. The RAM 24 is used as a working storage area when the CPU 21 performs the processing.
  • The input device 25 is configured by a keyboard, a mouse, and the like, and is used to input a command and data. The display device 26 is configured by a liquid crystal display (LCD), a cathode ray tube (CRT), or the like, and is used to display a command, inputted data, the status of processing described later, and the like.
  • The encryption device 27 decrypts encrypted data that is encrypted transmission-object data received from the user device 12 and encrypts transmission-object data held by the authentication device 11.
  • The communication device 28 performs communications with the user device 12 via the network 13. Note that a communication device 38 of the user device 12 performs communications with the authentication device 11 via the network 13.
  • The judgement device 29 collates a solution received from the user device 12 via the network 13 with a solution generated by the encryption device 27 to judge whether those solutions match.
  • Next, a configuration of the communication device 28 will be described. FIG. 3 is a block configuration diagram of the communication device 28.
  • The communication device 28 includes an interface section 281 and a communication section 282.
  • The interface section 281 exchanges data between the bus 30 and the communication device 28. The interface section 281 receives, from the communication section 282, an access request signal, solution data, or encrypted data, which has been sent from the user device 12, and sends the received access request signal, solution data, or encrypted data to the bus 3 0. Further, the interface section 281 receives, from the bus 30, a solution request signal described later or encrypted data, which is destined for the user device 12, and sends the received solution request signal or encrypted data to the communication section 282.
  • Next, a configuration of the encryption device 27 will be described. FIG. 4 is a block configuration diagram of the encryption device 27.
  • The encryption device 27 includes an interface section 271, a pre-processing section 272, an encryption and decryption section 273, a solution generating section 274, and a connection section 275.
  • The interface section 271 exchanges data between the bus 30 and the communication device 28.
  • The interface section 271 receives, from the communication device 28 via the bus 30, the solution request signal to be sent to the user device 12 or encrypted division data items (the encrypted division data items are obtained when plaintext transmission-obj ect data is divided in units of a predetermined number of bits to generate multiple plaintext division data items and the plaintext division data items are encrypted), also receives transmission-object data from the HDD 23 via the bus 30, and sends the received encrypted division data items or transmission-object data to the pre-processing section 272.
  • When solution data is received, the interface section 271 sends data indicating that the solution data has been received, to the solution generating section 274.
  • On the other hand, as described later, the interface section 271 receives decrypted transmission-object data from the connection section 275 and encrypted data from the encryption and decryption section 273, and sends those pieces of data to the bus 30.
  • The pre-processing section 272 has a function of dividing the transmission-object data received from the bus 30 via the interface section 271, in units of the predetermined number of bits to generate plaintext division data items and sending the plaintext division data items to the encryption and decryption section 273. How to divide the transmission-object data will be described later.
  • The encryption and decryption section 273 has a function of receiving theplaintext division data items or the encrypted division data items from the pre-processing section 272; encrypting, when the plaintext division data items are received, the plaintext division data items; and decrypting, when the encrypted division data items are received, the encrypted division data items. Note that, in the encryption and decryption section 273 of this embodiment, the reference number of bits, serving as a unit of processing used when processings of encryption and decryption are performed, is fixed. The reference number of bits used in this embodiment is 8 bits, but it is not limited to 8 bits. Details of the processings of encryption and decryption will be described.
  • In this embodiment, the description is given on the assumption that the processings of encryption and decryption are performed by using a given algorithm and a given key which are unique to each user device 12. As described later in Modification 1, at least one of the algorithm and the key, to be used for encryption and decryption, may be sequentially generated anew at predetermined timing by using solutions sequentially generated in the user device 12 and the authentication device 11. Further, as described later in Modification 2, the processings of encryption and decryption may be performed by using a given algorithm and a given key which are common to multiple predetermined user devices. Further, at least one of the algorithm and the key may be sequentially generated anew by using solutions sequentially generated in the multiple predetermined user devices and the authentication device 11.
  • The solution generating section 274 sequentially generates a solution when the data indicating that the solution request signal has been received is received from the interface section 271.
  • The solutions generated by the solution generating section 274 of the authentication device 11 are identical to the solutions generated by a solution generating section 374 described later of the user device 12 in the same order as in the solution generating section 274. The solution used in this embodiment is a pseudorandom number.
  • The generated solution is sent to the interface section 271 and further sent to the judgement device 29 via the bus 30.
  • The connection section 275 has a function of connecting plaintext division data items generated by decrypting encrypted division data items in the encryption and decryption section 273 in the original order to obtain one piece of transmission-object data. The transmission-object data is sent to the interface section 271 and further sent, via the bus 30, to the HDD 23 or the CPU 21 as needed.
  • The connection section 275 also has a function of connecting encrypted division data items generated by encrypting plaintext division data items in the encryption and decryption section 273 to obtain one piece of encrypted data. The encrypted data is sent to the interface section 271, further sent from the interface section 271 to the communication section 282 of the communication device 28 via the bus 30, and further sent from the communication section 282 to the user device 12. Note that the connection section 275 may not have the function of connecting encrypted division data items generated by encrypting plaintext division data items in the encryption and decryption section 273. In this case, the encrypted division data items are sequentially sent in the order of encryption to the communication device of the user device 12 serving as a transmission destination. When the connection section 275 does not have the function of connecting the encrypted division data items, the encrypted division data items can be directly sent to the communication section 282 without passing through the connection section 275.
  • Note that the same number of encryption devices 27 as that of registered user devices 12 are provided, and each encryption device 27 has the same configuration as the encryption device of each of the registered user devices 12.
  • Next, a configuration of the judgement device 29 will be described. FIG. 5 is a block configuration diagram of the judgement device 29.
  • The judgement device 29 includes an interface section 291, a judgement section 292, and an ID data recording section 293.
  • The interface section 291 receives, from the communication device 28 via the bus 30, ID data added to an access request signal or solution data which has been sent from the user device 12, or receives solution data generated by the encryption device 27 via the bus 30, and sends the received ID data or solution data to the judgement section 292.
  • The interface section 291 also receives judgement data indicating that the user device 12 is valid from the judgement section 292. The judgement data is sent to the HDD 23 or the like via the bus 30 and transmission and reception of data are started between the user device 12 and the authentication device 11.
  • The interface section 291 also receives a solution request signal described later from the judgement section 292, and sends the solution request signal to the communication device 28 via the bus 30.
  • In the ID data recording section 293, multiple pieces of ID data indicating multiple user devices registered in the authentication device 11 are recorded.
  • Upon reception of an access request from the user device 12, the judgement section 292 judges whether ID data sent from the user device 12 has been recorded in the ID data recording section 293. When the ID data has been recorded, the judgement section 292 generates a solution request signal for requesting the user device 12 to send solution data. The solution request signal is sent from the interface section 291 to the communication device 28 via the bus 30 and further sent to the user device 12.
  • The solution data sent from the user device 12 is collated with solution data generated by the encryption device 27. When those pieces of solution data match, the user device 12 is judged as valid.
  • The judgement section 292 has a timer (not shown). Every time a predetermined period of time elapses after the user device 12 is judged as valid, the judgement section 292 generates a solution request signal to request the user device 12 to send new solution data.
  • Note that, in this embodiment, the authentication device 11 sends a solution request signal to the user device 12, and, in response to this, the user device 12 sends solution data to the authentication device 11. The solution-data generation and transmissionmechanism is not limited to this. The configuration may be made such that the timing of generation of the solution data after access authentication is judged in advance between the authentication device 11 and the user device 12 and the solution data generated in the user device 12 is sent to the authentication device 11.
  • Next, the configuration of the user device 12 will be described.
  • FIG. 6 shows a hardware configuration of the user device 12.
  • The hardware configuration of the user device 12 is basically the same as that of the authentication device 11. However, the user device 12 is different from the authentication device 11 in that the user device 12 does not include the judgement device 29 included in the authentication device 11.
  • In the user device 12, a CPU 31, a ROM 32, an HDD 33, a RAM 34, an input device 35, a display device 36, the communication device 38, and a bus 39 are identical to the CPU 21, the ROM 22, the HDD 23, the RAM 24, the input device 25, the display device 26, the communication device 28, and the bus 30 in the authentication device 11, respectively.
  • Note that predetermined data recorded in the ROM 32 or the HDD 33 includes ID data unique to the user device 12 and transmission-object data.
  • An encryption device 37 has a function of encrypting transmission-object data and decrypting encrypted data as in the encryption device 27 of the authentication device 11.
  • Hereinafter, a configuration of the encryption device 37 will be described.
  • FIG. 7 is a block configuration diagram of the encryption device 37.
  • The encryption device 37 includes an interface section 371, a pre-processing section 372, an encryption and decryption section 373, a solution generating section 374, and a connection section 375.
  • The interface section 371 exchanges data between the bus 39 and the encryption device 37. The interface section 371 receives, from the communication device 38 via the bus 39, a solution request signal or encrypted division data items, sent from the authentication device 11, also receives transmission-object data from the HDD 33 via the bus 39, and sends the received encrypted division data items or transmission-object data to the pre-processing section 372.
  • When the solution request signal is received, the interface section 371 sends data indicating that the solution request signal has been received to the solution generating section 374.
  • On the other hand, as described later, the interface section 371 receives decrypted transmission-object data from the connection section 375 and encrypted data from the encryption and decryption section 373, and sends those pieces of data to the bus 39.
  • The pre-processing section 372 has a function of dividing the transmission-object data received from the bus 39 via the interface section 371, in units of a predetermined number of bits to generate plaintext division data items and sending the plaintext division data items to the encryption and decryption section 373.
  • The encryption and decryption section 373 has a function of receiving theplaintext division data items or the encrypted division data items from the pre-processing section 372; encrypting, when the plaintext division data items are received, the plaintext division data items; and decrypting, when the encrypted division data items are received, the encrypted division data items. Note that, in the encryption and decryption section 373 of this embodiment, the reference number of bits, serving as a unit of processing used when processings of encryption and decryption are performed, is fixed. The reference number of bits used in this embodiment is 8 bits, but it is not limited to 8 bits.
  • In this embodiment, the description is given on the assumption that the processings of encryption and decryption are performed by using a given algorithm and a given key as in the authentication device 11.
  • The solution generating section 374 sequentially generates a solution when the data indicating that the solution request signal has been received is received from the interface section 371.
  • The generated solution is sent to the interface section 371 and further sent to the communication device 38 via the bus 39.
  • Functions of the connection section 375 of the user device 12 is the same as those of the connection section 275 of the authentication device 11. The connection section 375 connects plaintext division data items generated by decrypting encrypted division data items in the encryption and decryption section 373, to generate one piece of transmission-object data. The transmission-object data is sent to the HDD 33 or the like via the bus 39. The connection section 375 also has a function of connecting encrypted division data items generated by encrypting plaintext division data items in the encryption and decryption section 373, to obtain one piece of encrypted data. The encrypted data is sent to the interface section 371, further sent from the interface section 371 to the communication section 383 of the communication device 38 via the bus 39, and further sent from the communication section 383 to the authentication device 11 via the network 13. Note that, as in the encryption device 27 of the authentication device 11, the connection section 375 may not have the function of connecting encrypted division data items generated by encrypting plaintext division data items in the encryption and decryption section 373.
  • FIG. 8 is a diagram showing a block configuration of the communication device 38.
  • The communication device 38 includes an interface section 381, an ID data adding section 382, and the communication section 383.
  • The interface section 381 exchanges data between the bus 39 and the communication device 38. The interface section 381 receives, from the communication section 383, a solution request signal or encrypted data, which has been sent from the authentication device 11, and sends the received solution request signal or encrypted data to the bus 39. Further, the interface section 381 receives, from the bus 39, an access request signal described later, solution data, or encrypted data, which is destined for the authentication device 11, and sends the received access request signal, solution data, or encrypted data to the ID data adding section 382.
  • When the access request signal, solution data, or encrypted data is sent to the authentication device 11, the ID data adding section 382 adds ID data to, for example, the header of the access request signal or the like to be sent. The ID data identifies the user device 12 which sends the encrypted data or the like. The ID data uniquely specifies each user device 12, and is recorded in the ROM 32 or the HDD 33. The ID data adding section 382 reads ID data from the ROM 32 or the HDD 33 and adds the ID data to the encrypted data or the like. The authentication device 11 can understand, from the ID data added to the received encrypted data or the like, the user device 12 which has sent the encrypted data or the like. The ID data adding section 382 sends the encrypted data or the like, to which the ID data has been added, to the communication section 383. The communication section 383 receives the encrypted data or the like and sends it to the authentication device 11.
  • Next, a flow of processing performed in the authentication system 1 will be described.
  • An outline description will be given of the flow of processing performed in the authentication system 1 with reference to FIG. 9.
  • First, the authentication device 11 judges whether the user device 12 which has accessed the authentication device 11 is valid (S110).
  • When it is judged that the user device 12 which has accessed the authentication device 11 is not valid (No in S110), transmission and reception of encrypted data are not started between the authentication device 11 and the user device 12.
  • On the other hand, when it is judged that the user device 12 which has accessed the authentication device 11 is valid (Yes in S110), communications are started between the authentication device 11 and the user device 12 (S120) and transmission and reception of encrypted data that is encrypted transmission-object data are started.
  • After the transmission and reception of encrypted data are started, when it is necessary to judge the validity of the user device 12 for the second time ormore (Yes in S130), the authentication device 11 judges whether the user device 12 which has accessed the authentication device 11 is valid (S140). Note that the description is given, in this embodiment, on the assumption that the case where the validity of the user device 12 needs to be judged for the second time or more is the case where a predetermined period of time has elapsed after the access to the authentication device 11 is authenticated. The necessity of the validity check is not limited to this case. It may be necessary to judge the validity of the user device 12 for the second time or more when the amount of data sent and received between the authentication device 11 and the user device 12 reaches a predetermined amount of data. Note that a predetermined period of time (a predetermined amount of data) may or may not be a fixed period of time (a fixed amount of data).
  • When it is judged that the user device 12 which has accessed the authentication device 11 is not valid (No in S140), the transmission and reception of the encrypted data are not continued between the authentication device 11 and the user device 12 and the processing is ended.
  • On the other hand, when it is judged that the user device 12 which has accessed the authentication device 11 is valid (Yes in S140), and when communications are not ended between the authentication device 11 and the user device 12 (No in S150), the transmission and reception of encrypted data are continued until it becomes necessary again to judge the validity of the user device 12.
  • When the communications are ended between the authentication device 11 and the user device 12 (Yes in S150), the processing is ended.
  • Referring to FIG. 10, a detailed description will be given of the process of S110, in which the authentication device 11 judges whether the user device 12 which has accessed the authentication device 11 is valid.
  • First, the user device 12 sends an access request signal to which ID data has been added, to the authentication device 11.
  • In the user device 12, for example, when a command to access the authentication device 11 is inputted from the input device 35, the CPU 31 generates the access request signal, reads the ID data of the user device 12 from the ROM 32 or the HDD 33, and temporarily records the ID data in the RAM 34, for example. The ID data is sent from the ROM 32 or the HDD 33 to the communication device 38 via the bus 39 while the access request signal is also sent to the communication device 38. The ID data is added to the access request signal in the ID data adding section 382. The access request signal, to which the ID data has been added, is sent from the communication section 383 to the communication device 28 of the authentication device 11 via the network 13.
  • When the authentication device 11 is accessed by the user device 12 (S1101), the authentication device 11 judges whether the ID data sent from the user device 12 has been registered (S1102).
  • Specifically, when the communication device 28 receives the access request signal, to which the ID data has been added, from the user device 12, the ID data which has been added to the access request signal is sent from the interface section 281 of the communication device 28 to the judgement section 292 of the judgement device 29 via the bus 30. The judgement section 292 judges whether ID data that matches the received ID data is included in the ID data recording section 293.
  • When the ID data sent from the user device 12 has been registered in the authentication device 11 (when ID data that matches the received ID data is included) (Yes in S1102), the authentication device 11 sends a solution request signal to the user device 12 (S1103).
  • Specifically, the judgement section 292 of the judgement device 29 generates the solution request signal for requesting the user device 12 to send solution data. The solution request signal is sent from the interface section 291 to the communication device 28 via the bus 30. The solution request signal is further sent from the communication device 28 to the user device 12.
  • Note that the solution request signal generated by the judgement section 292 of the judgement device 29 is also sent to the encryption device 27 corresponding to the user device 12 included in the authentication device 11, and the encryption device 27 generates solution data (S1104).
  • When the solution request signal is received, the user device 12 generates solution data to be sent to the authentication device 11.
  • Specifically, the solution request signal is received by the communication device 38 and sent to the interface section 371 of the encryption device 37 via the bus 39. When the solution request signal is received, the interface section 371 of the encryption device 37 sends data indicating that the solution request signal has been received, to the solution generating section 374. The solution generating section 374 receives the data.
  • On the other hand, when the solution request signal is received, the interface section 271 of the encryption device 27 of the authentication device 11 sends data indicating that the solution request signal has been received, to the solution generating section 274. The solution generating section 274 receives the data.
  • Upon reception of the data, the solution generating section 374 or the solution generating section 274 starts generating a solution.
  • Hereinafter, how the solution generating section 374 generates a solution will be described. In this embodiment, every time the solution request signal is received by the interface section 271 or 371, the corresponding solution generating section 274 or 374 generates a solution. The solution generated in this embodiment is a matrix (X) of 8 rows by 8 columns, but the form of the solution is not limited to this.
  • Note that a procedure to generate a solution in the solution generating section 274 of the authentication device 11 is the same as that in the solution generating section 374 of the user device 12.
  • In this embodiment, the solution generating section 374 continuously generates a solution in a nonlinear transition manner, but the characteristic of the solution is not necessarily required. As a result of the nonlinear transition, the solution is a pseudorandom number.
  • To continuously generate a solution in the nonlinear transition manner, the following methods are conceivable: (1) the solution generation process includes calculation of a power of a past solution; (2) the solution generation process includes multiplication of two or more past solutions; and a combination of (1) and (2).
  • In this embodiment, the solution generating section 374 has a 01 solution (X01) and a 02 solution (X02) as predetermined initial matrices (for example, the 01 solution and the 02 solution are recorded in a predetermined memory such as the HDD 33 or the ROM 32). Each user devices 12 has different initial matrices, and therefore, each user device 12 generates a different solution.
  • Note that the solution generating section 274 of the encryption device 27 in the authentication device 11 records the same initial matrices as each user device 12 in association with the ID data in a predetermined memory such as the HDD 23 or the ROM 22.
  • The solution generating section 374 substitutes the initial matrices into a solution generation algorithm to generate a first solution (X1) as follows.
  • The first solution (X1)=X02X01+α (in this embodiment, "α" is a matrix of 8 rows by 8 columns)
  • This is the solution generated first.
  • When the interface section 371 receives the next solution request signal from the bus 39, the solution generating section 374 generates a second solution (X2) as follows.
  • The second solution (X2)=X1X02
  • Similarly, every time the interface section 371 receives a solution request signal from the bus 39, the solution generating section 374 generates a third solution, a fourth solution, ... an N-th solution, as follows.
    • The third solution (X3)=X2X1
    • The fourth solution (X4)=X3X2
    • :
    • The N-th solution (XN)=XN-1XN-2+α
  • The solution generated as described above is sent to the interface section 371 and is also held in the solution generating section 374. In order to generate the N-th solution (XN) in this embodiment, the (N-1)-th solution (XN-1) and the (N-2)-th solution (XN-2), that is, the two solutions generated immediately before are used. Therefore, to generate a new solution, the solution generating section 374 needs to hold the two solutions generated immediately before (or a section other than the solution generating section 374 needs to hold the two solutions). Conversely, solutions that are older than the two solutions generated immediately before are not used any more to generate a new solution. Thus, in this embodiment, the solution generating section 374 always holds the two solutions generated immediately before. When a new solution is generated, the older of the two solutions generated immediately before is deleted from thepredeterminedmemory inwhich that solution has been recorded.
  • The solutions generated as described above are chaotic solutions which are generated in the nonlinear transition manner, that is, pseudorandom numbers.
  • Note that, when a solution is generated by the solution generating section 374 as described above, environmental information unique to each user device 12 may be used.
  • For example, the above-mentioned "α" can be environmental information. Alternatively, the 01 solution (X01) and the 02 solution (X02), serving as the initial matrices held by the solution generating section 374 of each user device 12 and the solution generating section 274 of the authentication device 11 corresponding to the user device 12, can be environmental information. In short, the environmental information unique to the user device 12 may be used to generate matrices (including the initial matrices) or may be used as the initial matrices.
  • In addition, "α" serving as environmental information is not necessarily used every time a solution is generated. For example, "α" may be used only for the first solution (X1)=X02X01+α and when the first solution is used. The second solution and the subsequent solutions may be obtained by a general expression of "the N-th solution (XN)=XN-1XN-2".
  • The environmental information unique to each user device 12 can be information of a peripheral device connected to the user device 12, for example. Specifically, examples of the information of a peripheral device include: the address information or the MAC address information of a router allocated to each user device 12; information on the type or the serial number of a printer connected to each user device 12; information of a server connected to each user device 12; and information of a mouse connected to each user device 12.
  • The environmental information unique to each user device 12 can also be information used in the user device 12. Specifically, examples of the information used in the user device 12 include: folder name information of a folder storing particular data such as transmission-object data or folder name information of a predetermined folder included in each user device 12; file name information of a predetermined file; and address information, hierarchical information, and byte-count information of the folder or file.
  • Predetermined calculation or predetermined conversion is applied to such environmental information to convert the environmental information into a number falling in a range where the number can be used as "α", the 01 solution (X01), or the 02 solution (X02) to use the obtained number.
  • Specifically, "α" is obtained, for example, when the code of the characters composing a file name is expressed in binary "1s" and "0s", by sequentially arranging a data string expressed by "1s" and "0s" as elements in a matrix of 8 rows by 8 columns. In a case where the number of the data items included in the data string obtained when the file name is expressed in binary "1s" and "0s" is smaller than the number of the elements in a matrix of 8 rows by 8 columns, that is, 64, the data string is used repeatedly. Of course, how the environmental information is used may be judged appropriately. For example, when a file name is composed by alphabetic characters, it is possible to replace "A" with "1" , "B" with "2", "C" with "3", .... , and "Z" with "26", and to appropriately arrange numbers obtained by adding all those numbers, multiplying all those numbers, or in another way, as elements in a matrix of 8 rows by 8 columns.
  • In addition to the above-mentioned expression of "the N-th solution (XN) =XN-1XN-2(+α)", the following expressions can also be used to generate theN-th solution in the nonlinear transition manner.
  • Note that "α" in brackets indicates that "α" is not necessarily required to obtain the second solution and the subsequent solutions, also in example cases described below.
  • Examples of the expressions include:
    1. (a) The N-th solution (XN)=(XN-1)P(+α);
    2. (b) The N-th solution (XN)=(XN-1)P(XN-2)Q(XN-3)R(XN-4)S(+α); and
    3. (c) The N-th solution (XN)=(XN-1)L+(XN-2)Q(+α).
  • Note that "P", "Q", "R", and "S" are predetermined constants. The solution generating section 374 has one initial matrix when (a) expression is used, two initial matrices when (c) expression is used, and four initial matrices when (b) expression is used.
  • Environmental information unique to each user device 12 is hardly obtained by devices other than the user device 12 and the authentication device 11 in which the environmental information has been registered. The environmental information unique to each user device 12 cannot be obtained from the outside.
  • Therefore, when the environmental information unique to each user device 12 is stored in advance in the solution generating section 274 of the encryption device 27 of the authentication device 11 and in the solution generating section 374 of the encryption device 37 of the user device 12 and the environmental information is used as "α" or the like to generate solution data, it is possible to prevent a thirdpersonwho does not know the environmental information unique to the user device 12 from pretending to be the user, and to further improve the level of communication security.
  • Further, the above-mentioned "α" can also be variable particular information, instead of being environmental information as described above.
  • This particular information can be information which spontaneously arises one after another as time elapses and can be obtained in common even from remote locations. Examples of the particular information include information judged based on the weather in a particular region; information judged based on the content of television broadcasting of a television station, which is broadcasted at a particular time slot; and information judged based on a result of a particular sport.
  • As described above, the solution data generated by the solution generating section 374 of the user device 12 is sent from the interface section 371 to the communication device 38 via the bus 39. The solution data is further sent from the communication section 383 of the communication device 38 to the communication device 28 of the authentication device 11 via the network 13.
  • Further, the solution data generated by the solution generating section 274 of the encryption device 27 of the authentication device 11 is sent from the interface section 271 to the judgement device 29 via the bus 30.
  • Upon reception of the solution data from the user device 12 (S1105), the authentication device 11 judges whether the received solution data matches the solution data generated in the authentication device 11 (S1106).
  • Specifically, when the communication device 28 receives the solution data from the user device 12, the solution data is sent from the interface section 281 of the communication device 28 to the judgement section 292 of the judgement device 29 via the bus 30. The judgement section 292 collates the solution data received from the user device 12 with the solution data generated by the encryption device 27 of the authentication device 11 to judge whether those pieces of solution data match.
  • When the solution data received from the user device 12 matches the solution data generated by the encryption device 27 of the authentication device 11 (Yes in S1106), the judgement section 292 judges that the user device 12 is valid (S1107).
  • On the other hand, when the solution data received from the user device 12 does not match the solution data generated by the encryption device 27 of the authentication device 11 (No in S1106), the judgement section 292 judges that the user device 12 is not valid (S1108).
  • When the ID data sent from the user device 12 has not been registered in the authentication device 11 (when ID data that matches the received ID data is not included) (No in S1102), the judgement section 292 also judges that the user device 12 is not valid (S1108).
  • As described above, the process of S110, in which the authentication device 11 judges whether the user device 12 which has accessed the authentication device 11 is valid, is ended.
  • When it is judged that the user device 12 is valid, access is allowed and transmission and reception of encrypted data are started (S120).
  • Hereinafter, a description will be given of a process of encrypting transmission-object data held by the authentication device 11 and sending the encrypted transmission-object data to the user device 12.
  • First, transmission-object data is read based on a request from the user device 12. Specifically, the CPU 21 reads the transmission-object data from the HDD 23 and temporarily stores the transmission-object data, for example, in the RAM 24. The transmission-object data is sent from the HDD 23 to the encryption device 27 via the bus 30. In more detail, the transmission-object data is sent to the pre-processing section 272 via the interface section 271.
  • In the pre-processing section 272, the transmission-object data is divided in units of the predetermined number of bits to generate plaintext division data items. The plaintext division data items are sent to the encryption and decryption section 273 and encrypted by using a given algorithm and a given key to generate encrypted division data items. The encrypted division data items are sent to the connection section 275. The connection section 275 connects the encrypted division data items to generate one piece of encrypted data. In this case, the order of the encrypted division data items corresponds to the original order of theplaintext division data items.
  • The encrypted data generated as described above is sent to the communication device 28 of the authentication device 11 via the bus 30. The encrypted data is received by the interface section 281 of the communication device 28 and sent to the communication section 282. The communication section 282 sends the encrypted data to the user device 12 via the network 13.
  • The above-described process is similarly performed when transmission-object data held by the user device 12 is encrypted and sent to the authentication device 11.
  • Next, a description will be given of a decryption process of the encrypted data performed when the user device 12 receives the encrypted data from the authentication device 11.
  • The encrypted data sent from the authentication device 11 to the user device 12 is received by the communication section 383 of the communication device 38 of the user device 12 and sent to the interface section 381. The interface section 381 sends the encrypted data to the encryption device 37.
  • The pre-processing section 372 of the encryption device 37 receives the encrypted data via the interface section 371. The pre-processing section 372 divides the received encrypted data in units of the predetermined number of bits to generate encrypted division data items. To generate the encrypted division data items by dividing the encrypted data, the pre-processing section 372 performs the processing reverse to the processing performed in the connection section 275 of the authentication device 11. Specifically, the encrypted data is divided into a plurality of encrypted division data items in units of 8 bits from the top.
  • Next, the encrypted division data items are sent to the encryption and decryption section 373 and are decrypted to generate plaintext division data items. The decryption is performed by using the given algorithm and the key which have been used for the encryption performed in the authentication device 11.
  • The plaintext division data items generated as described above are sent to the connection section 375. The connection section 375 receives the plaintext division data items and connects the plaintext division data items together to regenerate one piece of plaintext data, which is the original state of the transmission-object data before the encryption has been applied in the authentication device 11.
  • The above-described process is similarly performed when transmission-object data held by the user device 12 is encrypted and sent to the authentication device 11.
  • Note that transmission-object data may be any type of data as long as the data needs to be sent from the user device 12 (the authentication device 11) to the authentication device 11 (the user device 12). In this embodiment, it is assumed that the transmission-object data is recorded in the HDD 33 (the HDD 23). The transmission-object data may be the data read from another recording medium such as an external recording medium to the user device 12 or the authentication device 11.
  • As described above, transmission and reception of encrypted data are performed between the authentication device 11 and the user device 12.
  • On the other hand, when it is judged that the user device 12 is not valid, an access to the authentication device 11 is not allowed and thus communications (transmission and reception of encrypted data) are not started.
  • When communications are started (S120), the process of S130, in which the validity of the user device 12 is judged at intervals of a predetermined period of time, is performed in this embodiment.
  • Specifically, the judgement section 292 of the judgement device 29 generates a solution request signal for requesting the user device 12 to send new solution data, at intervals of a predetermined period of time (for example, 30 seconds) after the transmission and reception of encrypted data are started. The subsequent processes are performed as in S1103 to S1108 of FIG. 10. Solution data is generated in each of the user device 12 and the authentication device 11 based on this solution request signal.
  • The judgement section 292 of the judgement device 29 judges whether the solution data received from the user device 12 matches the solution data generated in the authentication device 11.
  • When it is judged that the solution data received from the user device 12 matches the solution data generated by the encryption device 27 of the authentication device 11, the judgement section 292 judges that the user device 12 is valid, and thus, the transmission and reception of encrypted data are continued.
  • On the other hand, when it is judged that the solution data received from the user device 12 does not match the solution data generated by the encryption device 27 of the authentication device 11, the judgement section 292 judges that the user device 12 is not valid, and thus, the transmission and reception of encrypted data are ended.
  • In the authentication system 1 having such a configuration, while transmission and reception of encrypted data are being performed between the authentication device 11 and the user device 12, the judgement of solution match is performed multiple times by using solutions generated sequentially. In other words, even when it is once judged by the authentication device 11 that the user device 12 is valid, the validity of the user device 12 is judged many times by performing the judgement of solution match multiple times while transmission and reception of transmission-object data are being performed. Thus, according to the authentication system 1, it is possible to reduce the possibility of an unauthorized access to be made after authentication and to improve the level of communication security. Further, because the validity of the user device 12 is judged by using new solutions to be generated sequentially, in other words, by using a different solution each time, the level of communication security can be improved.
  • Note that, in the above-described embodiment, transmission-object data and a solution are sent and received in parallel. In other words, a packet which contains solution data is sent at predetermined intervals between transmission events of packets which contain transmission-object data. Two data paths are established between the authentication device 11 and the user device 12 in the authentication system 1 of this embodiment. One of the two data paths is used to send and receive solution data, for judging the validity of the user device 12. The other one of the two data paths is used to send and receive encrypted data.
  • However, the transmission and reception method is not limited thereto. The transmission and reception of transmission-object data including encrypted data, and the transmission and reception of a solution may be performed alternately in a time-division manner. Specifically, after communications are started, while solution data is being sent from the user device 12 to the authentication device 11, transmission-object data may not be sent or received. Specifically, for example, solution data may be sent in the header of each of packets which contain transmission-obj ect data. In other words, one data path may be established between the authentication device 11 and the user device 12 in the authentication system 1. The data path is used to send and receive solution data, for judging the validity of the user device 12, and also used to send and receive encrypted data.
  • As described above, a data path to receive a solution for judging the validity of the user device 12, from the user device 12 and a data path to send and receive transmission-object data may be identical to each other or may be separated from each other.
  • Note that the description has been given on the assumption that, in the authentication system 1, solution data itself which is generated in the user device 12 based on a solution request signal sent from the authentication device 11 is sent to the authentication device 11 via the network 13. Transmission of the solution data is not limited thereto. The solution data generated in the user device 12 may be encrypted in the encryption device 37 by using a given algorithm and a given key before being sent to the authentication device 11 via the network 13. When the encrypted solution data is sent via the network 13, the level of security becomes higher than when the solution data itself is sent.
  • In the case where the encrypted solution data is sent from the user device 12 as descried above, the configuration can be made such that solution data generated in the authentication device 11 is also encrypted by using the given algorithm and the given key in the encryption device 27, and the judgement device 29 compares the pieces of encrypted solution data to judge whether the pieces of encrypted solution data match. In this case, the encryption device 27 of the authentication device 11 performs encryption of a solution generated by the solution generating section 274, in addition to decryption of encrypted data received from the user device 12 and encryption of transmission-object data held by the authentication device 11.
  • Further, in the case where the encrypted solution data is sent from the user device 12, the encrypted solution data may be decrypted before the judgement device 29 compares the pieces of encrypted solution data to judge whether the pieces of encrypted solution data match. In this case, the encryption device 27 of the authentication device 11 performs decryption of an encrypted solution received from the user device 12, in addition to decryption of encrypted data received from the user device 12 and encryption of transmission-object data held by the authentication device 11.
  • Further, the description has been given on the assumption that, in the authentication system 1, collation of pieces of solution data is performed in the authentication device 11 at intervals of a predetermined period of time while transmission and reception of transmission-object data are being performed between the authentication device 11 and the user device 12. The collation of pieces of solution data may be performed at any timing as long as the collation is performed multiple times while the transmission and reception of transmission-object data are being performed.
  • For example, the collation of pieces of solution data may be performed in the authentication device 11 every time the amount of data sent and received reaches a predetermined amount of data, while transmission and reception of transmission-object data are being performed between the authentication device 11 and the user device 12.
  • In the authentication system 1, for example, data held in the user device 12 which is generally recorded in the user device 12 can be sent to the authentication device 11 as the transmission-object data.
  • Data in the user device 12 which has been sent to the authentication device 11 may still remain in the user device 12 or may be deleted from the user device 12.
  • When the former configuration is employed, the data stored in the user device 12 can also be stored, as a backup copy thereof, in the authentication device 11 which is a device other than the user device 12, while preventing a third person from reading the data stored in the user device 12.
  • According to the authentication system 1, as described above, even after it is judged by the authentication device 11 that the user device 12 is valid, the validity of the user device is judged multiple times, and thus, the level of communication security during transmission and reception of transmission-object data is very high. Accordingly, when the authentication system 1 is used, the user device 12 can make a backup copy of data of the user device 12 while keeping the same security level as when the data is stored in the user device 12.
  • On the other hand, when the latter configuration is employed, data which is stored in the user device 12 and is only used in an emergency or data (for example, a will) which is stored in the user device 12 but is not desired to be disclosed to other people or people other than a particular person can be transferred to the authentication device 11 without being left in the user device 12. In other words, the authentication device 11 can be used as a safe-deposit box in the network.
  • Specifically, in order to make it possible that data in the user device 12 which has been sent to the authentication device 11 can only be read by the user himself/herself of the user device 12, the following processing or the like may be performed: the data stored in the user device 12 is encrypted by using a solution generated by the solution generating section 274 of the encryption device 27, which is unique to each user device 12, and encrypted data is sent to the authentication device 11; and the user device 12 stores the order of the solution used to encrypt the data among the solutions generated by the solution generating section 274. Thus, because the encrypted data sent to the authentication device 1 can be decrypted only by the user device 12 having the encryption device 27 which has been used to encrypt the data, only the user of the user device 12 can read the data while the others cannot decrypt the encrypted data.
  • Further, in order to make it possible that data in the user device 12 which has been sent to the authentication device 11 can also be read by a particular person in addition to the user of the user device 12, it is only necessary to give a removable encryption device which generates the same solution as the solution used to encrypt the data to the particular person in advance. Thus, because the encrypted data sent to the authentication device 1 can be decrypted only by the user of the user device 12 having the encryption device 27 which has been used to encrypt the data or by the particular person having the encryption device which generates the solution used to encrypt the data, only the user of the user device 12 and the particular person can read the data while the others cannot decrypt the encrypted data.
  • Further, in order to make it possible that, among pieces of data in the user device 12, which have been sent to the authentication device 11, a given piece of data can be read by the user of the user device 12 and a first person and another given piece of data can be read by the user of the user device 12 and a second person, it is only necessary to give a removable encryption device which generates the same solution as the solution used to encrypt the given piece of data to the first person in advance, and to give a removable encryption device which generates the same solution as the solution used to encrypt the other given piece of data to the second person in advance. Accordingly, among pieces of encrypted data which have been sent to the authentication device 1, encrypted data obtained from the given piece of data can be decrypted only by the user of the user device 12 having the encryption device 27 which has been used to encrypt the data or by the first person having the encryption device which generates the solution used to encrypt the given piece of data. Similarly, among pieces of encrypted data which have been sent to the authentication device 1, encrypted data obtained from the other given piece of data can be decrypted only by the user of the user device 12 having the encryption device 27 which has been used to encrypt the data or by the second person having the encryption device which generates the solution used to encrypt the other givenpiece of data. Therefore, the encrypted data obtained from the given piece of data cannot be decrypted by persons including the second person other than the user of the user device 12 and the first person. The encrypted data obtained from the other given piece of data cannot be decrypted by persons including the first person other than the user of the user device 12 and the second person. It can be made possible for the user to specify, for each piece of data, a person who can read the data.
  • (Modification 1)
  • In the authentication system 1, the validity of the user device 12 is judged by collating solution data generated in the user device 12 with solution data generated in the authentication device 11 to judge whether those pieces of solution data match. However, when the authentication device 11 and the user device 12 have identical common data (for example, ID data, a password unique to the user device 12, or the like), the validity of the user device 12 may be judged by using the common data instead of using solution data.
  • In other words, the validity of the user device 12 may be judged by sending encrypted common data which is obtained when common data held by the user device 12 is encrypted by the encryption device, instead of sending solution data from the user device 12 to the authentication device 11, and collating, in the authentication device 11, data obtained by decrypting the encrypted common data with common data held by the authentication device 11 to judge whether those pieces of common data match. Further, the validity of the user device 12 may be judged in the authentication device 11 by collating the encrypted common data received from the user device 12 with encrypted common data which is obtained when the encryption device encrypts in advance common data held by the authentication device 11 to judge whether those pieces of encrypted common data match.
  • Note that an algorithm and a key to be used for encryption performed in the user device 12 (and for decryption performed in the authentication device 11) are not fixed but are sequentially generated anew by using solutions to be sequentially generated in the user device 12 and the authentication device 11.
  • FIG. 11 shows an encryption device 47 used in the user device 12 according to Modification 1.
  • As shown in this figure, the encryption device 47 includes an interface section 471, apre-processing section 472, an encryption and decryption section 473, a solution generating section 474, a connection section 477, an algorithm generating section 475, and a key generating section 476.
  • The algorithm generating section 475 generates an algorithm based on a solution received from the solution generating section 474. The algorithm is used when the encryption and decryption section 473 performs encryption processing and decryption processing.
  • The key generating section 476 generates a key based on the solution received from the solution generating section 474. The key is used when the encryption and decryption section 473 performs encryption processing and decryption processing. The keys generated by the key generating section 476 of the user device 12 are identical to the keys generated, in the same order as in the key generating section 476, by a key generating section 576 of the authentication device 11.
  • Note that an encryption device 57 used in the authentication device 11 in Modification 1 has the same configuration as the encryption device 47. As shown in FIG. 12, the encryption device 57 includes an interface section 571, a pre-processing section 572, an encryption and decryption section 573, a solution generating section 574, an algorithm generating section 575, the key generating section 576, and a connection section 577, which correspond to the interface section 471, the pre-processing section 472, the encryption and decryption section 473, the solution generating section474, thealgorithmgeneratingsection475, the key generating section 476, and the connection section 477 of the encryption device 47, respectively.
  • Hereinafter, the process of S110, in which the authentication device 11 judges whether the user device 12 which has accessed the authentication device 11 is valid, will be described in detail with reference to FIG. 13.
  • When the authentication device 11 is accessed by the user device 12 (S2101), the authentication device 11 judges whether ID data sent from the user device 12 has been registered (S2102). The processes of S2101 and S2102 correspond to the processes of S1101 and S1102 of FIG. 10.
  • When the ID data sent from the user device 12 has been registered in the authentication device 11 (when ID data that matches the received ID data is included) (Yes in S2102), the authentication device 11 sends a common-data request signal to the user device 12 (S2103).
  • Specifically, the judgement section 292 of the judgement device 29 generates the common-data request signal for requesting the user device 12 to send common data. The common-data request signal is sent from the interface section 291 to the communication device 28 and the encryption device 57 via the bus 30. The common-data request signal is further sent from the communication device 28 to the user device 12.
  • When the common-data request signal is received, the user device 12 generates encrypted common data to be sent to the authentication device 11.
  • Specifically, the common-data request signal is received by the communication device 38 and is sent to the CPU 31 and to the interface section 471 of the encryption device 47 via the bus 39.
  • When the common-data request signal is received, the interface section 471 of the encryption device 47 sends data indicating that the common-data request signal has been received, to the solution generating section 474. The solution generating section 474 receives the data. Upon reception of the data, the solution generating section 474 starts to generate a solution. How to generate a solution has been described above. Note that, the generated solution is sent to the algorithm generating section 475 and the key generating section 476 and at the same time is stored in the solution generating section 474.
  • Further, the CPU 31 reads common data. Specifically, the CPU 31 reads the common data from the HDD 33 and temporarily stores the common data, for example, in the RAM 34. The common data is sent from the HDD 33 to the encryption device 47 via the bus 39. In more detail, the common data is sent to the pre-processing section 472 via the interface section 471.
  • In the pre-processing section 472, the common data is divided in units of the predetermined number of bits to generate plaintext division data items. The plaintext division data items thus generated are sent to the encryption and decryption section 473 in a stream manner, in the order of the generation of the plaintext division data items.
  • In parallel to the generation of the plaintext division data items, the algorithm generating section 475 generates an algorithm to be used to encrypt the plaintext division data items.
  • The algorithm generating section 475 according to this embodiment generates an algorithm based on a solution.
  • In this embodiment, the algorithm generating section 475 generates an algorithm as defined below.
  • The algorithm used in this embodiment is defined as follows: "a solution matrix "X" of 8 rows by 8 columns to the power of "a" is rotated clockwise by "n x 90°" and then is multiplied by a matrix "Y" of 1 row by 8 columns obtained from an 8-bit plaintext division data item".
  • Here, in some cases, "a" is assumed to be a predetermined constant. However, in this embodiment, "a" varies according to the solution. In other words, the algorithm used in this embodiment varies according to the solution. For example, "a" can be judged to be a remainder (when the remainder is 0, "a"=1) obtained when a number obtained by adding all numbers of the elements included in a solution matrix of 8 rows by 8 columns is divided by 5.
  • Further, "n" described above is a number predetermined by a key. When the key is a constant, "n" is fixed. However, as described below, the key varies according to the solution. In other words, "n" also varies according to the solution in this embodiment.
  • Of course, another algorithm can also be used.
  • In this embodiment, the algorithm generating section 475 generates an algorithm every time a solution is received from the solution generating section 474, and sends the algorithm to the encryption and decryption section 473.
  • In parallel to the generation of the plaintext division data items, the key generating section 476 generates a key to be used to encrypt the plaintext division data items.
  • The key generating section 476 generate a key based on the solution.
  • In this embodiment, the key generating section 476 generate a key as defined below.
  • A key used in this embodiment is a number obtained by adding all numbers of the elements included in a solution matrix of 8 rows by 8 columns. Thus, in this embodiment, the key varies based on the solution.
  • Note that another key can also be used.
  • In this embodiment, the key generating section 476 generates a key every time a solution is received from the solution generating section 474, and sends the key to the encryption and decryption section 473.
  • The encryption and decryption section 473 encrypts the plaintext division data items received from the pre-processing section 472, based on the algorithm received from the algorithm generating section 475 and the key received from the key generating section 476.
  • As described above, the algorithm is defined as follows: "a solution matrix "X" of 8 rows by 8 columns to the power of "a" is rotated clockwise by "n x 90°" and then is multiplied by a matrix "Y" of 1 row by 8 columns obtained from an 8-bit plaintext division data item". Also, "n" serving as the key is the number as described above.
  • For example, when "a" is 3 and "n" is 6, encryption is performed by multiplying a plaintext division data item by a matrix of 8 rows by 8 columns obtained when the matrix of 8 rows by 8 columns obtained by X cubic is rotated clockwise by 6x90°=540°.
  • Data items generated through the processing are encrypted division data items.
  • The encrypted division data items are sent to the connection section 477. The connection section 477 connects the encrypted division data items together to generate one piece of encrypted data. At that time, the order of the encrypted division data items corresponds to the original order of the plaintext division data items.
  • The encrypted common data generated as described above is sent to the communication device 38 of the user device 12 via the bus 39. The encrypted common data is received by the interface section 381 of the communication device 38, and sent to the communication section 383 after ID data is added to the encrypted common data in the ID data adding section 382. The communication section 383 sends the encrypted common data to the authentication device 11 via the network 13.
  • The authentication device 11 receives the encrypted common data sent from the user device 12 (S2104).
  • Specifically, the communication section 282 of the communication device 28 of the authentication device 11 receives the encrypted common data.
  • The communication section 282 sends the encrypted common data to the interface section 281. The interface section 281 sends the encrypted common data to the encryption device 57 via the bus 30.
  • The encryption device 57 receives the encrypted common data via the bus 30 and decrypts the encrypted common data (S2105).
  • Hereinafter, the decryption will be described in detail.
  • First, the pre-processing section 572 of the encryption device 57 receives the encrypted common data via the interface section 571.
  • The pre-processing section 572 divides the received encrypted data in units of a predetermined number of bits to generate encrypted division data items.
  • To generate the encrypted division data items by dividing the encrypted data, the pre-processing section 572 performs the processing reverse to the processing performed in the connection section 477 of the user device 12. Specifically, the encrypted data is divided into multiple encrypted division data items in units of 8 bits from the top.
  • Next, the encrypted division data items are sent to the encryption and decryption section 573 and decrypted to generate plaintext division data items.
  • The decryption is performed as the processing reverse to that performed in the encryption and decryption section 473 of the user device 12. For this reason, the authentication device 11 requires the algorithm and key which have been required for the encryption performed in the user device 12.
  • The algorithm and key to be used for the decryption are generated in the encryption device 57. This generation mechanism will be described below.
  • Information indicating that the interface section 571 of the encryption device 57 has received the encrypted common data is sent to the solution generating section 574. The solution generating section 574 generates a solution every time this information is received.
  • The solution generating section 574 of the encryption device 57 of the authentication device 11 generates a solution through the same processing which has been performed in the solution generating section 474 of the user device 12. Note that, as described above, the solution generating section 574 has a solution generation algorithm and the same initial matrices as those associated with the ID data of the user device 12 and held by the solution generating section 474 of the user device 12. Therefore, a solution generated in the authentication device 11 is identical to the solution generated in the same order in the encryption device 47 of the user device 12 while transmission and reception of data are being performed.
  • The generated solution is sent from the solution generating section 574 to the pre-processing section 572, the algorithm generating section 575, and the key generating section 576.
  • Every time a solution is received, the algorithm generating section 575 generates an algorithm based on the received solution. The algorithm generation process performed by the algorithm generating section 575 of the authentication device 11 is the same as the algorithm generation process performed by the algorithm generating section 475 of the user device 12. The generated algorithm is sent from the algorithm generating section 575 to the encryption and decryption section 573.
  • Meanwhile, every time a solution is received, the key generating section 476 generates a key based on the received solution. The key generation process performed by the key generating section 576 of the authentication device 11 is the same as the key generation process performed by the key generating section 576 of the user device 12. The generated key is sent from the key generating section 576 to the encryption and decryption section 573.
  • In this authentication system, every time encryption is performed in the user device 12, a new solution is generated in the user device 12, and every time decryption of encrypted data generated in the user device 12 is performed in the authentication device 11, a new solution is generated in the authentication device 11. Further, as described above, a solution generated in the encryption device 57 of the authentication device 11 is identical to the solution generated in the same order in the encryption device 47 of the corresponding user device 12. Therefore, a solution generated when common data is encrypted in the user device 12 and an algorithm and a key which are generated based on the solution are always identical to a solution generated in the encryption device 57 of the authentication device 11 and an algorithm and a key which are generated based on the solution, during decryption applied to the encrypted common data generated using the algorithm and key generated based on the solution in the user device 12.
  • The encryption and decryption section 573 performs decryption processing by using the algorithm received from the algorithm generating section 575, as described above. More specifically, based on the algorithm (in which "a solution matrix "X" of 8 rows by 8 columns to the power of "a" is rotated clockwise by "n x 90°" and then is multiplied by a matrix "Y" of 1 row by 8 columns obtained from an 8-bit plaintext division data item to generate an encrypted division data item") received from the algorithm generating section 575, the encryption and decryption section 573 generates an algorithm for decryption processing, (in which "a solution matrix "X" of 8 rows by 8 columns to the power of "a" is rotated clockwise by "n x 90°" and then is multiplied by "Y" to generate a plaintext division data item, when an encrypted division data item is regarded as a matrix "Z" of 1 row by 8 columns"), and performs the calculation according to the above-mentioneddefinitionbyusing the key, thereby performing the decryption processing. Through this processing, the encryption and decryption section 573 sequentially decrypts the encrypted division data items received in a stream manner from the pre-processing section 572, to generate plaintext division data items.
  • The plaintext division data items thus generated are sent to the connection section 577. The connection section 577 connects the received plaintext division data items together to obtain the original common data used before the encryption was applied in the user device 12.
  • Note that, when the decryption cannot be performed (No in S2105), it is judged that the user device 12 is not valid (S2108).
  • On the other hand, when the decryption can be performed (Yes in S2105), the decrypted common data is sent from the interface section 571 of the encryption device 57 to the judgement section 292 of the judgement device 29 via the bus 30. Further, common data held by the authentication device 11 is read by the CPU 21 from the HDD 23 and sent to the judgement section 292 of the judgement device 29 via the bus 30.
  • The judgement section 292 collates the common data which has been received from the user device 12 and to which the decryption has been applied, with the common data held by the authentication device 11 to judge whether they match (S2106).
  • When the common data which has been received from the user device 12 and to which the decryption has been applied matches the common data held by the authentication device 11 (Yes in S2106), the judgement section 292 judges that the user device 12 is valid (S2107).
  • On the other hand, when the common data which has been received from the user device 12 and to which the decryption has been applied does not match the common data held by the authentication device 11 (No in S2106), the judgement section 292 judges that the user device 12 is not valid (S2108).
  • As described above, the validity of the user device 12 which has accessed the authentication device 11 is judged by the authentication device 11.
  • In Modification 1, it is assumed that transmission and reception of transmission-object data are not performed while solution data is being sent from the user device 12 to the authentication device 11 (in other words, transmission and reception of transmission-object data and transmission and reception of solution data are performed alternately in a time-division manner). However, the data transmission and reception method is not limited to this. Data transmission and reception may be performed in parallel to transmission and reception of encrypted common data.
  • Note that a modification which can be applied to the above-described embodiment can also be applied to Modification 1.
  • (Modification 2)
  • In the authentication system 1 of this embodiment, each user device 12 has the encryption device 37 unique to the user device 12. However, each user device may have, in addition to the encryption device unique to the user device, an encryption device common to multiple user devices connected to the authentication device.
  • Modification 2 including such a user device will be described in detail below.
  • FIG. 14 is a schematic diagram showing an entire configuration of an authentication system 3 according to Modification 2.
  • As shown in FIG. 14, the authentication system 3 includes "n" user devices 62 which include user devices 62A, 62B, and 62C, and an authentication device 61.
  • Hereinafter, a configuration of each of the user devices 62 andaconfigurationof the authentication device 61 will be described. First, a description is given of the configuration of the user device 62.
  • FIG. 15 shows a hardware configuration of the user device 62.
  • The hardware configuration of the user device 62 is basically the same as that of the user device 12. However, the user device 62 is different from the user device 12 in that, while the user device 12 has one encryption device 37, the user device 62 has, instead of the encryption device 37, two kinds of encryption devices, i.e. , a first encryption device 37A and a second encryption device 37B.
  • The first encryption device 37A is different for each user device, such as the encryption device 37 of the user device 12.
  • The second encryption device 37B is an encryption device common to the multiple user devices 62 (in this Modification, the "n" user devices 62).
  • In this embodiment, processings of encryption and decryption of the first encryption device 37A are performed using a given algorithm and a given key which are unique to the first encryption device 37A of the user device 62.
  • In this embodiment, processings of encryption and decryption of the second encryption device 37B are performed using a given algorithm and a given key which are unique to and common to the second encryption devices 37B of the user devices 62.
  • Note that, in the user device 62, the CPU 31, the ROM 32, the HDD 33, the RAM 34, the input device 35, the display device 36, the communication device 38, and the bus 39 are identical to those of the user device 12, respectively.
  • FIG. 16 shows a hardware configuration of the authentication device 61.
  • The hardware configuration of the authentication device 61 is different from that of the authentication device 11 in that, while the authentication device 11 has one encryption device 27, the authentication device 61 has, instead of the encryption device 27, two kinds of encryption devices, i.e. , first encryption devices 27A and a second encryption device 27B.
  • The same number of first encryption devices 27A are provided as that of the user devices 62, and each first encryption device 27A sequentially generates a solution identical to that generated by the first encryption device 37A of the corresponding user device 62, in the same order.
  • The second encryption device 27B sequentially generates a solution identical to that generated by the second encryption device 37B of the user device 62, in the same order.
  • Note that, in the authentication device 61, the CPU 21, the ROM 22, the HDD 23, the RAM 24, the input device 25, the display device 26, the communication device 28, the judgement device 29, and the bus 30 are identical to those included in the authentication device 61, respectively.
  • A flow of processing performed in the authentication system 3, which includes the user devices 62 each of which includes the second encryption device 37B, and the authentication device 61 which includes the second encryption device 27B corresponding to the second encryption device 37B, is identical to the flow of processing performed in the authentication system 1.
  • According to the authentication system 3, which includes the user devices 62 and the authentication device 61, the multiple user devices 62 having the same second encryption devices 37B can also access the same data, thereby improving the convenience.
  • Note that, it is assumed that processings of encryption and decryption of the encryption devices of the user device 62 and the authentication device 61 according to Modification 2 are performed by using a given algorithm and a given key which are unique. The algorithm and the key are not limited to those used above. The algorithm and the key may be sequentially generated anew at a predetermined timing by using solutions sequentially generated in the first encryption device 37A or the second encryption device 37B of the user device 62 and the first encryption device 27A corresponding to the first encryption device 37A or the second encryption device 27B corresponding to the second encryption device 37B, of the authentication device 61.
  • To generate a solution in the first encryption device 37A, environmental information unique to each user device 62 may be used, as in the above-mentioned embodiment. The environmental information unique to each user device 62 is hardly obtained by devices other than the user device 62 and the authentication device 61 in which the environmental information has been registered. The environmental information cannot be obtained from the outside. Thus, it is possible to prevent a third person who does not know the environmental information unique to the user device 62 from masquerading as the user, and to further improve the level of communication security.
  • Further, to generate a solution in the second encryption device 27B, environmental information unique to the authentication device 61 may be used. Specifically, environmental information of the authentication device 61 is registered in advance in the second encryption device 27B of the authentication device 61 and the second encryption device 37B of each user device 62, and the registered environmental information is used to generate a solution.
  • The environmental information unique to the authentication device 61 is hardly obtained by devices other than the authentication device 61 and the user device 62 in which the environmental information has been registered. The environmental information cannot be obtained from the outside. Thus, it is possible to prevent a third person who does not know the environmental information unique to the authentication device 61 from masquerading as the user, and to further improve the level of communication security. Further, when the environmental information unique to the authentication device 61 is used, there is a possibility that the user device 62 can be prevented from accessing a fake authentication device, such as the authentication device 61 of a malicious third person who fakes address information of the authentication device 61.
  • Note that, the environmental information unique to the authentication device 61 can be information of a peripheral device connected to the authentication device 61, for example. Examples of the information of a peripheral device connected to the authentication device 61 include the address information or the MAC address information of a router allocated to the authentication device 61, information on the type or the serial number of a printer connected to the authentication device 61, information of a server connected to the authentication device 61, and information of a mouse connected to the authentication device 61.
  • Further, the environmental information unique to the authentication device 61 may also be information in the authentication device 61. Examples of the information used in the authentication device 61 include folder name information of a folder containing particular data or a predetermined folder, included in the authentication device 61, file name information of a predetermined file, and address information, hierarchical information, and byte-count information of the folder or file.

Claims (22)

  1. An authentication system, comprising:
    a user device; and
    an authentication device for judging whether the user device is valid, wherein:
    the user device comprises:
    solution generating means for sequentially generating a solution that is a pseudorandom number;
    solution transmission means for sending the solution generated by the solution generating means to the authentication device; and
    transmission and reception means for performing transmission and reception of transmission-object data with the authentication device when the authentication device judges that the user device is valid;
    the authentication device comprises:
    solution generating means for sequentially generating a solution identical to the solution generated in the user device, in the same order as in the user device;
    judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the solution generating means; and
    transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid; and
    the judgement means performs the judgement multiple times by using solutions sequentially generated, while transmission and reception of the transmission-object data are being performed with the user device.
  2. An authentication system, comprising:
    at least two user devices; and
    an authentication device for judging whether each of the user devices is valid, wherein:
    each of the user devices comprises:
    a first user solution generating means and a second user solution generating means each for sequentially generating a solution that is a pseudorandom number;
    solution transmission means for sending the solution generated by the first user solution generating means or the second user solution generating means to the authentication device; and
    transmission and reception means for performing transmission and reception of transmission-object data with the authentication device when the authentication device judges that the user device is valid;
    the first user solution generating means is unique to each of the user devices;
    the second user solution generating means is common to predetermined user devices;
    the authentication device comprises:
    a number of first authentication solution generating means, the number being the same as that of the user devices, each for sequentially generating a solution identical to the solution generated by the first user solution generating means of a corresponding user device, in the same order as in the first user solution generating means;
    a second authentication solution generating means for sequentially generating a solution identical to the solution generated by the second user solution generating means of the user device, in the same order as in the second user solution generating means;
    a first judgement means for judging whether a user device is valid by using a solution generated by the first user solution generating means of the user device and received from the user device and the solution generated by the first authentication solution generating means corresponding to the user device;
    a second judgement means for judging whether a user device is valid by using a solution generated by the second user solution generating means of the user device and received from the user device and the solution generated by the second authentication solution generating means; and
    transmission and reception means for performing transmission and reception of transmission-object data with the user device when the first judgement means or the second judgement means judges that the user device is valid; and
    the first judgement means or the second judgement means performs the judgement multiple times by using solutions sequentially generated, while transmission and reception of the transmission-object data are being performed with the user device.
  3. An authentication device which receives a solution that is a pseudorandom number sequentially generated in a user device from the user device and judges whether the user device is valid by using the received solution, comprising:
    solution generating means for sequentially generating a solution identical to the solution generated in the user device, in the same order as in the user device;
    judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the solution generating means; and
    transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid,
    wherein the judgement means performs the judgement multiple times by using solutions sequentially generated, while transmission and reception of the transmission-object data are being performed with the user device.
  4. An authentication device according to claim 3, wherein the judgement means performs the judgement while the transmission and reception of the transmission-object data are being performed with the user device at intervals of a predetermined period of time.
  5. An authentication device according to claim 3, wherein the judgement means performs the judgement while the transmission and reception of the transmission-object data are being performed with the user device, every time an amount of data sent and received by the transmission and reception means reaches a predetermined amount of data.
  6. An authentication device according to any one of claims 3 to 5, wherein:
    the solution generated in the user device is sent to the authentication device as it is; and
    the judgement means collates the solution received from the user device with the solution generated by the solution generating means, and judges, when the solutions match, that the user device is valid.
  7. An authentication device according to any one of claims 3 to 5, wherein:
    the solution generated in the user device is encrypted by using a predetermined algorithm and a predetermined key and then sent to the authentication device;
    the authentication device further comprises solution encrypting means for encrypting the solution generated by the solution generating means, by using the predetermined algorithm and the predetermined key; and
    the judgement means collates the encrypted solution received from the user device with the solution encrypted by the solution encrypting means, and judges, when the solutions match, that the user device is valid.
  8. An authentication device according to any one of claims 3 to 5, wherein:
    the solution generated in the user device is encrypted by using a predetermined algorithm and a predetermined key and then sent to the authentication device;
    the authentication device further comprises solution decrypting means for decrypting the encrypted solution received from the user device, by using the predetermined algorithm and the predetermined key used when the solution was encrypted in the user device; and
    the judgement means collates the solution decrypted by the solution decrypting means with the solution generated by the solution generating means, and judges, when the solutions match, that the user device is valid.
  9. An authentication device according to any one of claims 3 to 8, wherein:
    the user device divides original plaintext data into multiple plaintext division data items in units of a predetermined number of bits, encrypts the multiple plaintext division data items by using a predetermined algorithm and a predetermined key to generate encrypted division data items, and sends the encrypted division data items to the authentication device as the transmission-object data; and
    the authentication device further comprises:
    decryption means for decrypting the encrypted division data items by using the predetermined algorithm and the predetermined key used when the multiple plain text division data items are encrypted, to generate plaintext division data items; and
    connection means for connecting the plaintext division data items decrypted by the decryption means to generate decrypted data.
  10. An authentication device according to claim 9, wherein:
    the authentication device holds data identical to the transmission-object data held by the user device; and
    the judgement means collates the decrypted data decrypted by the decryption means with the data identical to the transmission-object data, and judges, when those pieces of data match, that the user device is valid.
  11. An authentication device according to claim 9, wherein:
    the authentication device holds data identical to the transmission-object data held by the user device;
    the authentication device further comprises:
    division means for dividing the data identical to the transmission-object data into units of a predetermined number of bits to generate division data items; and
    encryption means for encrypting the division data items by using the predetermined algorithm and the predetermined key; and the judgement means collates the encrypted division data items received from the user device with the division data items encrypted by the encryption means, and judges, when those pieces of data match, that the user device is valid.
  12. An authentication device according to any one of claims 3 to 11, further comprising means for establishing two data paths between the authentication device and the user device, wherein:
    one of the two data paths is used to perform transmission and reception of the solution to be used to judge the validity of the user device; and
    the other one of the two data paths is used to perform transmission and reception of the transmission-object data.
  13. An authentication device according to any one of claims 3 to 11, further comprising means for establishing one data path between the authentication device and the user device,
    wherein the one data path is used to perform the transmission and reception of the solution to be used to judge the validity of the user device and is also used to perform the transmission and reception of the transmission-object data.
  14. An authentication device according to any one of claims 7 to 9 and 11, wherein at least one of the predetermined algorithm and the predetermined key is sequentially generated anew at a predetermined timing by using the solutions sequentially generated in the user device and the authentication device.
  15. An authentication device used in combination with at least two user devices, for judging whether each of the user devices is valid, each of the user devices comprising: a first user solution generating means and a second user solution generating means each for sequentially generating a solution that is apseudorandomnumber; solution transmission means for sending the solution generated by the first user solution generating means or the second user solution generating means to the authentication device; and transmission and reception means for performing transmission and reception of transmission-object data with the authentication device when the authentication device judges that the user device is valid, the first user solution generating means being unique to each of the user devices, and the second user solution generating means being common to predetermined user devices, the authentication device comprising:
    a number of first authentication solution generating means, the number being the same as that of the user devices, each for sequentially generating a solution identical to the solution generated by the first user solution generating means of a corresponding user device, in the same order as in the first user solution generating means;
    a second authentication solution generating means for sequentially generating a solution identical to the solution generated by the second user solution generating means of the user device, in the same order as in the second user solution generating means;
    a first judgement means for judging whether a user device is valid by using a solution generated by the first user solution generating means of the user device and received from the user device, and the solution generated by the first authentication solution generating means corresponding to the user device;
    a second judgement means for judging whether a user device is valid by using a solution generated by the second user solution generating means of the user device and received from the user device, and the solution generated by the second authentication solution generating means; and
    transmission and reception means for performing transmission and reception of transmission-object data with the user device when the first judgement means or the second judgement means judges that the user device is valid,
    wherein the first judgement means or the second judgement means performs the judgement multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device.
  16. An authentication method executed in an authentication device which comprises: reception means for receiving a solution that is a pseudorandom number sequentially generated in a user device from the user device; and judgement means for judging whether the user device is valid by using the received solution, the authentication method comprising the steps performed by the authentication device of:
    sequentially generating a solution identical to the solution generated in the user device, in the same order as in the user device;
    judging whether a user device is valid by using a solution received from the user device and the generated solution; and
    performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid,
    wherein the judgement is performed multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device.
  17. An authentication method executed in an authentication device which comprises: reception means for receiving, from a user device, a solution that is a pseudorandom number sequentially generated by solution generating means unique to the user device or a solution that is a pseudorandom number sequentially generated by solution generating means common to predetermined user devices; and judgement means for judging whether the user device is valid by using the received solution, the authentication method comprising the steps performed by the authentication device of:
    sequentially generating a solution identical to the solution generated by the solution generating means unique to the user device, in the same order as in the solution generating means unique to the user device, when the solution generated by the solution generating means unique to the user device is received from the user device;
    sequentially generating a solution identical to the solution generated by the solution generating means common to the predetermined user devices, in the same order as in the solution generating means common to the predetermined user devices, when the solution generated by the solution generating means common to the predetermined user devices is received from the user device;
    judging whether a user device is valid by using a solution received from the user device and the solution generated in the authentication device; and
    performing transmission and reception of transmission-obj ect data with the user device when the judgement means judges that the user device is valid,
    wherein the judgement is performed multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device.
  18. A user device used in combination with an authentication device, the authentication device receiving a solution that is a pseudorandom number sequentially generated in the user device from the user device, judging whether the user device is valid by using the received solution, and comprising: solution generating means for sequentially generating a solution that is a pseudorandom number; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, the judgement means performing the judgement multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-obj ect data are being per formed with the user device, the user device comprising:
    solution generating means for sequentially generating a solution identical to the solution generated in the authentication device, in the same order as in the authentication device;
    solution transmission means for sending the solution generated by the solution generating means to the authentication device; and
    transmission and reception means for performing the transmission and reception of the transmission-object data with the authentication device when the authentication device judges that the user device is valid.
  19. A user device according to claim 18, further comprising solution encrypting means for encrypting the solution generated by the solution generating means by using a predetermined algorithm and a predetermined key,
    wherein the solution encrypted by the solution encrypting means is sent to the authentication device.
  20. A user device used in combination with an authentication device, the authentication device receiving a solution that is a pseudorandom number sequentially generated in the user device from the user device, judging whether the user device is valid by using the received solution, and comprising: a first authentication solution generating means and a second authentication solution generating means each for sequentially generating a solution that is a pseudorandom number; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the first authentication solution generating means or the second authentication solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, the same number of the first authentication solution generating means being provided as that of the user device and each being unique to the corresponding user device, the second authentication solution generating means being common to predetermined user devices, the judgement means performing the judgement multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device, the user device comprising:
    a first user solution generating means unique to each of the user devices, for sequentially generating a solution identical to the solution generated by the corresponding first authentication solution generating means of the authentication device, in the same order as in the first authentication solution generating means;
    a second user solution generating means common to predetermined user devices, for sequentially generating a solution identical to the solution generated by the second authentication solution generating means of the authentication device, in the same order as in the second authentication solution generating means;
    solution transmission means for sending the solution generated by the first user solution generating means or the second user solution generating means to the authentication device; and
    transmission and reception means for performing the transmission and reception of the transmission-object data with the authentication device when the authentication device judges that the user device is valid.
  21. A data processing method executed in a user device used in combination with an authentication device, the authentication device receiving a solution that is a pseudorandom number sequentially generated in the user device from the user device, judging whether the user device is valid by using the received solution, and comprising: solution generating means for sequentially generating a solution that is a pseudorandom number; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, the judgement means performing the judgement multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-obj ect data are beingperformedwith the user device, the data processing method comprising the steps performed by the user device of:
    sequentially generating a solution identical to the solution generated in the authentication device, in the same order as in the authentication device;
    sending the generated solution to the authentication device; and
    performing the transmission and reception of the transmission-object data with the authentication device when the authentication device judges that the user device is valid.
  22. A data processing method executed in a user device used in combination with an authentication device, the authentication device receiving a solution that is a pseudorandom number sequentially generated in the user device from the user device, judging whether the user device is valid by using the received solution, and comprising: a first authentication solution generating means and a second authentication solution generating means each for sequentially generating a solution that is a pseudorandom number; judgement means for judging whether a user device is valid by using a solution received from the user device and the solution generated by the first authentication solution generating means or the second authentication solution generating means; and transmission and reception means for performing transmission and reception of transmission-object data with the user device when the judgement means judges that the user device is valid, the same number of the first authentication solution generating means being provided as that of the user device and each being unique to the corresponding user device, the second authentication solution generating means being common to predetermined user devices, the judgement means performing the judgement multiple times by using solutions sequentially generated, while the transmission and reception of the transmission-object data are being performed with the user device, the data processing method comprising the steps performed by the user device of:
    sequentially generating a solution identical to the solution generated by the first authentication solution generating means or the second authentication solution generating means of the authentication device, in the same order as in the first authentication solution generating means or the second authentication solution generating means of the authentication device;
    sending the generated solution to the authentication device; and
    performing the transmission and reception of the transmission-object data with the authentication device when the authentication device judges that the user device is valid.
EP07860567A 2006-12-28 2007-12-26 Authentication system Withdrawn EP2117161A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2006356232A JP2008165612A (en) 2006-12-28 2006-12-28 Authentication system, device, and method, user device, and data processing method
PCT/JP2007/075372 WO2008081972A1 (en) 2006-12-28 2007-12-26 Authentication system

Publications (1)

Publication Number Publication Date
EP2117161A1 true EP2117161A1 (en) 2009-11-11

Family

ID=39588641

Family Applications (1)

Application Number Title Priority Date Filing Date
EP07860567A Withdrawn EP2117161A1 (en) 2006-12-28 2007-12-26 Authentication system

Country Status (9)

Country Link
EP (1) EP2117161A1 (en)
JP (1) JP2008165612A (en)
KR (1) KR20090118028A (en)
CN (1) CN101675622A (en)
AU (1) AU2007340408A1 (en)
CA (1) CA2674161A1 (en)
MX (1) MX2009007120A (en)
TW (1) TW200843444A (en)
WO (1) WO2008081972A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105005720A (en) * 2015-06-24 2015-10-28 青岛大学 Computer security control system

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2018074327A (en) * 2016-10-27 2018-05-10 株式会社 エヌティーアイ Transmission/reception system, transmitter, receiver, method, and computer program

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11272613A (en) * 1998-03-23 1999-10-08 Hitachi Information Systems Ltd User authentication method, recording medium stored with program for executing the method, and user authentication system using the method
JP2006253745A (en) 2005-03-08 2006-09-21 N-Crypt Inc Data processing apparatus, system, and method
JP2006253746A (en) 2005-03-08 2006-09-21 N-Crypt Inc Data processing apparatus, system, and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2008081972A1 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105005720A (en) * 2015-06-24 2015-10-28 青岛大学 Computer security control system
CN105005720B (en) * 2015-06-24 2018-01-19 青岛大学 Computer security control system

Also Published As

Publication number Publication date
CN101675622A (en) 2010-03-17
MX2009007120A (en) 2009-09-04
JP2008165612A (en) 2008-07-17
TW200843444A (en) 2008-11-01
WO2008081972A1 (en) 2008-07-10
CA2674161A1 (en) 2008-07-10
AU2007340408A1 (en) 2008-07-10
KR20090118028A (en) 2009-11-17

Similar Documents

Publication Publication Date Title
US8966276B2 (en) System and method providing disconnected authentication
US5491752A (en) System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens
US7895436B2 (en) Authentication system and remotely-distributed storage system
EP1043862B1 (en) Generation of repeatable cryptographic key based on varying parameters
EP2020797B1 (en) Client-server Opaque token passing apparatus and method
US20120002805A1 (en) Cryptographic Key Spilt Combiner Including a Biometric Input
US20030204732A1 (en) System and method for storage and retrieval of a cryptographic secret from a plurality of network enabled clients
EP3149886B1 (en) Controlling access to a resource via a computing device
TWI531201B (en) A communication device, a communication device, an authentication device, a user device, a method of implementing the device, and a program
US20080155669A1 (en) Multiple account authentication
US10673633B2 (en) Hashed data retrieval method
Ku et al. A remote user authentication scheme using strong graphical passwords
EP2117161A1 (en) Authentication system
JPH11122238A (en) Network system
EP2117160A1 (en) Authentication system
Chang et al. A secure and efficient strong-password authentication protocol
CN110890965A (en) Data encryption method and device, and data decryption method and device
CN113162766B (en) Key management method and system for key component
EP3916592A1 (en) Distributed data processing with systems comprising hsm, se and other secure storage elements
CN115580840B (en) SMS short message system based on security policy
KR101155271B1 (en) Credit card settlement system
Yang et al. Cryptanalysis of log-in authentication based on circle property
Zabian et al. Multi-layer encryption algorithm for data integrity in cloud computing
Sohana et al. Agent command manipulation system using two keys encryption model
Daliri Authentication and Encryption Mechanisms

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20090728

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20110428